All the vulnerabilites related to Huawei - Yale-L61A
var-202009-1317
Vulnerability from variot
Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3);Versions earlier than 10.1.0.212(C00E210R5P1);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C01E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R8P12);Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2) contain an information vulnerability. A module has a design error that is lack of control of input. Attackers can exploit this vulnerability to obtain some information. This can lead to information leak. Huawei smartphone HONOR 20 PRO Contains an information disclosure vulnerability.Information may be obtained. Huawei Honor V20 is a smart phone of China's Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202009-1317", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "honor pro \u003c10.1.0.231", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "20" }, { "model": "honor pro \u003c10.1.0.160", "scope": "eq", "trust": 1.8, "vendor": "huawei", "version": "20" }, { "model": "honor pro \u003c10.1.0.212", "scope": "eq", "trust": 1.2, "vendor": "huawei", "version": "20" }, { "model": "honor pro \u003c10.1.0.214", "scope": "eq", "trust": 1.2, "vendor": "huawei", "version": "20" }, { "model": "honor pro \u003c10.1.0.225", "scope": "eq", "trust": 1.2, "vendor": "huawei", "version": "20" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.225\\(c431e3r1p2\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.212\\(c432e10r3p4\\)" }, { "model": "princeton-al10d", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p11\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c636e3r3p1\\)" }, { "model": "oxfords-an00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.212\\(c00e210r5p1\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.230\\(c432e9r5p1\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c636e3r3p1\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.230\\(c432e9r5p1\\)" }, { "model": "princeton-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p11\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c10e3r3p2\\)" }, { "model": "princeton-tl10c", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c01e160r2p11\\)" }, { "model": "yale-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r8p12\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c185e3r5p1\\)" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.225\\(c432e3r1p2\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.214\\(c185e3r3p3\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.214\\(c10e5r4p3\\)" }, { "model": "tony-al00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p11\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.213\\(c636e3r4p3\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c10e3r3p2\\)" }, { "model": "honor 20 pro", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor view 20", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "oxfords-an00a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "princeton-al10b", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "princeton-al10d", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "princeton-tl10c", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "tony-al00b", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "yale-al00a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "yale-l21a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "yale-l61a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor pro \u003c10.1.0.230", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "20" }, { "model": "honor pro \u003c10.1.0.213", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "20" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.230\\(c432e9r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c185e3r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c636e3r3p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.212\\(c432e10r3p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.213\\(c636e3r4p3\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.214\\(c10e5r4p3\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.214\\(c185e3r3p3\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:oxfords-an00a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.212\\(c00e210r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:oxfords-an00a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:princeton-al10d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:princeton-tl10c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c01e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r8p12\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.230\\(c432e9r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c636e3r3p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.225\\(c431e3r1p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.225\\(c432e3r1p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9235" } ] }, "cve": "CVE-2020-9235", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9235", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-52402", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9235", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9235", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2020-52402", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202009-252", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3);Versions earlier than 10.1.0.212(C00E210R5P1);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C01E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R8P12);Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2) contain an information vulnerability. A module has a design error that is lack of control of input. Attackers can exploit this vulnerability to obtain some information. This can lead to information leak. Huawei smartphone HONOR 20 PRO Contains an information disclosure vulnerability.Information may be obtained. Huawei Honor V20 is a smart phone of China\u0027s Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2020-9235" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "CNVD", "id": "CNVD-2020-52402" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9235", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-010696", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-52402", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202009-252", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "id": "VAR-202009-1317", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" } ], "trust": 1.09458715 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" } ] }, "last_update_date": "2023-12-18T13:12:50.056000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200902-07-smartphone", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en" }, { "title": "Patch for Huawei Honor 20 PRO information disclosure vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/234328" }, { "title": "HUAWEI HONOR 20 PRO Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=127436" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "information leak (CWE-200) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9235" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "db": "NVD", "id": "CVE-2020-9235" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-52402" }, { "date": "2021-02-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "date": "2020-09-03T19:15:12.417000", "db": "NVD", "id": "CVE-2020-9235" }, { "date": "2020-09-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-09-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-52402" }, { "date": "2021-02-01T08:35:00", "db": "JVNDB", "id": "JVNDB-2020-010696" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9235" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202009-252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-252" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Honor 20 PRO information disclosure vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2020-52402" }, { "db": "CNNVD", "id": "CNNVD-202009-252" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202009-252" } ], "trust": 0.6 } }
var-202012-1396
Vulnerability from variot
There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module. plural Huawei There are unspecified vulnerabilities in smartphones.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1396", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c185e2r2p1\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c10e3r3p2\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c185e3r5p1\\)" }, { "model": "princeton-al10d", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.168\\(c00e166r4p11\\)" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.225\\(c432e3r1p2\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c636e3r3p1\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.230\\(c432e9r5p1\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c10e3r3p2\\)" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.226\\(c10e3r1p1\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c636e3r3p1\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.230\\(c432e9r5p1\\)" }, { "model": "yale-l21a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "princeton-al10d", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 20 pro", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "yale-l61a", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.230\\(c432e9r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c185e3r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c636e3r3p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:princeton-al10d_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.168\\(c00e166r4p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.230\\(c432e9r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c185e2r2p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c636e3r3p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.225\\(c432e3r1p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.226\\(c10e3r1p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9223" } ] }, "cve": "CVE-2020-9223", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9223", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9223", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9223", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202012-1175", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" }, { "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module. plural Huawei There are unspecified vulnerabilities in smartphones.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-9223" }, { "db": "JVNDB", "id": "JVNDB-2020-014833" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9223", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-014833", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202012-1175", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" }, { "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "id": "VAR-202012-1396", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.44407895 }, "last_update_date": "2023-12-18T13:51:42.491000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20201216-03-smartphone", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en" }, { "title": "Multiple Huawei Product security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137332" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9223" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20201216-03-smartphone-cn" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" }, { "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "db": "NVD", "id": "CVE-2020-9223" }, { "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "date": "2020-12-29T18:15:13.447000", "db": "NVD", "id": "CVE-2020-9223" }, { "date": "2020-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-01T05:40:00", "db": "JVNDB", "id": "JVNDB-2020-014833" }, { "date": "2020-12-30T19:36:02.777000", "db": "NVD", "id": "CVE-2020-9223" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014833" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1175" } ], "trust": 0.6 } }
var-202012-1394
Vulnerability from variot
There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B. plural Huawei The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1394", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.277\\(c605e7r1p5\\)" }, { "model": "mate 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r3p8\\)" }, { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.270\\(c432e7r1p5\\)" }, { "model": "p30", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.272\\(c635e4r2p2\\)" }, { "model": "hima-l29c", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.273\\(c185e5r2p4\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.126\\(c605e19r1p3\\)" }, { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.273\\(c185e7r2p4\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.126\\(c10e7r5p1\\)" }, { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.270\\(c635e3r1p5\\)" }, { "model": "hima-l29c", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.273\\(c636e5r2p4\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.230\\(c432e9r5p1\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.126\\(c636e5r3p4\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.123\\(c432e22r2p5\\)" }, { "model": "laya-al00ep", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c786e160r3p8\\)" }, { "model": "hima-l29c", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.275\\(c10e4r2p4\\)" }, { "model": "princeton-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p11\\)" }, { "model": "yale-tl00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c01e160r8p12\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.126\\(c185e4r7p1\\)" }, { "model": "mate 20 x", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p8\\)" }, { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.277\\(c10e7r2p4\\)" }, { "model": "p30 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p8\\)" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.225\\(c432e3r1p2\\)" }, { "model": "p30", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.126\\(c636e7r3p4\\)" }, { "model": "mate 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.273\\(c636e7r2p4\\)" }, { "model": "tony-al00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r2p11\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.231\\(c10e3r3p2\\)" }, { "model": "yale-l61a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.226\\(c10e3r1p1\\)" }, { "model": "yalep-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.160\\(c00e160r8p12\\)" }, { "model": "p30 pro", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "tony-al00b", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "princeton-al10b", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "p30", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "honor 20 pro", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "laya-al00ep", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate 20", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "hima-l29c", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate 20 pro", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "mate 20 x", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.230\\(c432e9r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r3p8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.270\\(c432e7r1p5\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:9.1.0.272\\(c635e4r2p2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:hima-l29c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.273\\(c185e5r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:laya-al00ep_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c786e160r3p8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.225\\(c432e3r1p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c01e160r8p12\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.160\\(c00e160r8p12\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.270\\(c635e3r1p5\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.273\\(c185e7r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.273\\(c636e7r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.277\\(c10e7r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.277\\(c605e7r1p5\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.123\\(c432e22r2p5\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.126\\(c10e7r5p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.126\\(c185e4r7p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.126\\(c605e19r1p3\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.126\\(c636e5r3p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.126\\(c636e7r3p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:hima-l29c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.273\\(c636e5r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:hima-l29c_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.275\\(c10e4r2p4\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:yale-l61a_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.1.0.226\\(c10e3r1p1\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:yale-l61a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9247" } ] }, "cve": "CVE-2020-9247", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9247", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9247", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9247", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202007-1901", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" }, { "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B. plural Huawei The product contains a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-9247" }, { "db": "JVNDB", "id": "JVNDB-2020-014149" } ], "trust": 1.62 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9247", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-014149", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202007-1901", "trust": 0.6 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" }, { "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "id": "VAR-202012-1394", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.464622195 }, "last_update_date": "2023-12-18T12:55:45.679000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200729-03-smartphone", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en" }, { "title": "Repair measures for Huawei buffer error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=129041" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.0 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9247" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200729-03-smartphone-cn" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" }, { "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "db": "NVD", "id": "CVE-2020-9247" }, { "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "date": "2020-12-07T13:15:11.123000", "db": "NVD", "id": "CVE-2020-9247" }, { "date": "2020-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-03T04:39:00", "db": "JVNDB", "id": "JVNDB-2020-014149" }, { "date": "2020-12-08T16:27:30.147000", "db": "NVD", "id": "CVE-2020-9247" }, { "date": "2021-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202007-1901" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1901" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014149" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202007-1901" } ], "trust": 0.6 } }
cve-2020-9235
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | HONOR 20 PRO;Honor View 20;OxfordS-AN00A;Princeton-AL10B;Princeton-AL10D;Princeton-TL10C;Tony-AL00B;Yale-AL00A;Yale-L21A;Yale-L61A |
Version: Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1) Version: Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3) Version: Versions earlier than 10.1.0.212(C00E210R5P1) Version: Versions earlier than 10.1.0.160(C00E160R2P11) Version: Versions earlier than 10.1.0.160(C01E160R2P11) Version: Versions earlier than 10.1.0.160(C00E160R8P12) Version: Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1) Version: Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.123Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HONOR 20 PRO;Honor View 20;OxfordS-AN00A;Princeton-AL10B;Princeton-AL10D;Princeton-TL10C;Tony-AL00B;Yale-AL00A;Yale-L21A;Yale-L61A", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.212(C00E210R5P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R2P11)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.160(C01E160R2P11)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R8P12)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2)" } ] } ], "descriptions": [ { "lang": "en", "value": "Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3);Versions earlier than 10.1.0.212(C00E210R5P1);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C01E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R8P12);Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2) contain an information vulnerability. A module has a design error that is lack of control of input. Attackers can exploit this vulnerability to obtain some information. This can lead to information leak." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T18:04:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HONOR 20 PRO;Honor View 20;OxfordS-AN00A;Princeton-AL10B;Princeton-AL10D;Princeton-TL10C;Tony-AL00B;Yale-AL00A;Yale-L21A;Yale-L61A", "version": { "version_data": [ { "version_value": "Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1)" }, { "version_value": "Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3)" }, { "version_value": "Versions earlier than 10.1.0.212(C00E210R5P1)" }, { "version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)" }, { "version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)" }, { "version_value": "Versions earlier than 10.1.0.160(C01E160R2P11)" }, { "version_value": "Versions earlier than 10.1.0.160(C00E160R2P11)" }, { "version_value": "Versions earlier than 10.1.0.160(C00E160R8P12)" }, { "version_value": "Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1)" }, { "version_value": "Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei smartphones HONOR 20 PRO Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C185E3R5P1),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.212(C432E10R3P4),Versions earlier than 10.1.0.213(C636E3R4P3),Versions earlier than 10.1.0.214(C10E5R4P3),Versions earlier than 10.1.0.214(C185E3R3P3);Versions earlier than 10.1.0.212(C00E210R5P1);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C01E160R2P11);Versions earlier than 10.1.0.160(C00E160R2P11);Versions earlier than 10.1.0.160(C00E160R8P12);Versions earlier than 10.1.0.230(C432E9R5P1),Versions earlier than 10.1.0.231(C10E3R3P2),Versions earlier than 10.1.0.231(C636E3R3P1);Versions earlier than 10.1.0.225(C431E3R1P2),Versions earlier than 10.1.0.225(C432E3R1P2) contain an information vulnerability. A module has a design error that is lack of control of input. Attackers can exploit this vulnerability to obtain some information. This can lead to information leak." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200902-07-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9235", "datePublished": "2020-09-03T18:04:26", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.123Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9247
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en | x_refsource_MISC |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | HONOR 20 PRO |
Version: unspecified < 10.1.0.230(C432E9R5P1) Version: unspecified < 10.1.0.231(C10E3R3P2) |
||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.138Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HONOR 20 PRO", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.230(C432E9R5P1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.231(C10E3R3P2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HUAWEI Mate 20", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R3P8)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HUAWEI Mate 20 Pro", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.270(C432E7R1P5)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.270(C635E3R1P5)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.273(C185E7R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.273(C636E7R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.277(C10E7R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.277(C605E7R1P5)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HUAWEI Mate 20 X", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R2P8)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HUAWEI P30", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "9.1.0.272(C635E4R2P2)" }, { "lessThan": "10.1.0.123(C432E22R2P5)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.126(C10E7R5P1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.126(C185E4R7P1)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.126(C605E19R1P3)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.126(C636E5R3P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.126(C636E7R3P4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "HUAWEI P30 Pro", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R2P8)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Hima-L29C", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.273(C185E5R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.273(C636E5R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.275(C10E4R2P4)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Laya-AL00EP", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C786E160R3P8)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Princeton-AL10B", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R2P11)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Tony-AL00B", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R2P11)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Yale-L61A", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.225(C432E3R1P2)", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "10.1.0.226(C10E3R1P1)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Yale-TL00B", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C01E160R8P12)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "YaleP-AL10B", "vendor": "Huawei", "versions": [ { "lessThan": "10.1.0.160(C00E160R8P12)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-07T12:49:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en" } ], "source": { "advisory": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9247", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HONOR 20 PRO", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.230(C432E9R5P1)" }, { "version_affected": "\u003c", "version_value": "10.1.0.231(C10E3R3P2)" } ] } }, { "product_name": "HUAWEI Mate 20", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R3P8)" } ] } }, { "product_name": "HUAWEI Mate 20 Pro", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.270(C432E7R1P5)" }, { "version_affected": "\u003c", "version_value": "10.1.0.270(C635E3R1P5)" }, { "version_affected": "\u003c", "version_value": "10.1.0.273(C185E7R2P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.273(C636E7R2P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.277(C10E7R2P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.277(C605E7R1P5)" } ] } }, { "product_name": "HUAWEI Mate 20 X", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R2P8)" } ] } }, { "product_name": "HUAWEI P30", "version": { "version_data": [ { "version_affected": "=", "version_value": "9.1.0.272(C635E4R2P2)" }, { "version_affected": "\u003c", "version_value": "10.1.0.123(C432E22R2P5)" }, { "version_affected": "\u003c", "version_value": "10.1.0.126(C10E7R5P1)" }, { "version_affected": "\u003c", "version_value": "10.1.0.126(C185E4R7P1)" }, { "version_affected": "\u003c", "version_value": "10.1.0.126(C605E19R1P3)" }, { "version_affected": "\u003c", "version_value": "10.1.0.126(C636E5R3P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.126(C636E7R3P4)" } ] } }, { "product_name": "HUAWEI P30 Pro", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R2P8)" } ] } }, { "product_name": "Hima-L29C", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.273(C185E5R2P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.273(C636E5R2P4)" }, { "version_affected": "\u003c", "version_value": "10.1.0.275(C10E4R2P4)" } ] } }, { "product_name": "Laya-AL00EP", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C786E160R3P8)" } ] } }, { "product_name": "Princeton-AL10B", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R2P11)" } ] } }, { "product_name": "Tony-AL00B", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R2P11)" } ] } }, { "product_name": "Yale-L61A", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.225(C432E3R1P2)" }, { "version_affected": "\u003c", "version_value": "10.1.0.226(C10E3R1P1)" } ] } }, { "product_name": "Yale-TL00B", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C01E160R8P12)" } ] } }, { "product_name": "YaleP-AL10B", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "10.1.0.160(C00E160R8P12)" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a buffer overflow vulnerability in several Huawei products. The system does not sufficiently validate certain configuration parameter which is passed from user that would cause buffer overflow. The attacker should trick the user into installing and running a malicious application with a high privilege, successful exploit may cause code execution. Affected product include Huawei HONOR 20 PRO, Mate 20, Mate 20 Pro, Mate 20 X, P30, P30 Pro, Hima-L29C, Laya-AL00EP, Princeton-AL10B, Tony-AL00B, Yale-L61A, Yale-TL00B and YaleP-AL10B." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en" } ] }, "source": { "advisory": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200729-03-smartphone-en", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9247", "datePublished": "2020-12-07T12:49:00", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9223
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | n/a | HONOR 20 PRO |
Version: Versions earlier than 10.1.0.230(C432E9R5P1) Version: Versions earlier than 10.1.0.231(C10E3R3P2) Version: Versions earlier than 10.1.0.231(C185E3R5P1) Version: Versions earlier than 10.1.0.231(C636E3R3P1) |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:20.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HONOR 20 PRO", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.230(C432E9R5P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C10E3R3P2)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C185E3R5P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C636E3R3P1)" } ] }, { "product": "Princeton-AL10D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.168(C00E166R4P11)" } ] }, { "product": "Yale-L21A", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.230(C432E9R5P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C10E3R3P2)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C185E2R2P1)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.231(C636E3R3P1)" } ] }, { "product": "Yale-L61A", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.225(C432E3R1P2)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.226(C10E3R1P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-29T17:59:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HONOR 20 PRO", "version": { "version_data": [ { "version_value": "Versions earlier than 10.1.0.230(C432E9R5P1)" }, { "version_value": "Versions earlier than 10.1.0.231(C10E3R3P2)" }, { "version_value": "Versions earlier than 10.1.0.231(C185E3R5P1)" }, { "version_value": "Versions earlier than 10.1.0.231(C636E3R3P1)" } ] } }, { "product_name": "Princeton-AL10D", "version": { "version_data": [ { "version_value": "Versions earlier than 10.1.0.168(C00E166R4P11)" } ] } }, { "product_name": "Yale-L21A", "version": { "version_data": [ { "version_value": "Versions earlier than 10.1.0.230(C432E9R5P1)" }, { "version_value": "Versions earlier than 10.1.0.231(C10E3R3P2)" }, { "version_value": "Versions earlier than 10.1.0.231(C185E2R2P1)" }, { "version_value": "Versions earlier than 10.1.0.231(C636E3R3P1)" } ] } }, { "product_name": "Yale-L61A", "version": { "version_data": [ { "version_value": "Versions earlier than 10.1.0.225(C432E3R1P2)" }, { "version_value": "Versions earlier than 10.1.0.226(C10E3R1P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a denial of service vulnerability in some Huawei smartphones. Due to the improper processing of received abnormal messages, remote attackers may exploit this vulnerability to cause a denial of service (DoS) on the specific module." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201216-03-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9223", "datePublished": "2020-12-29T17:59:32", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:20.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }