Vulnerabilites related to huawei - alp-tl00b_firmware
Vulnerability from fkie_nvd
Published
2019-10-11 19:15
Modified
2024-11-21 04:40
Severity ?
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
References
Impacted products
{ cisaActionDue: "2022-05-03", cisaExploitAdd: "2021-11-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Android Kernel Use-After-Free Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", matchCriteriaId: "0EF46487-B64A-454E-AECC-D74B83170ACD", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C19813-E823-456A-B1CE-EC0684CE1953", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", matchCriteriaId: "146A767F-DC04-454B-9913-17D3A2B5AAA4", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", vulnerable: true, }, { criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "090AA6F4-4404-4E26-82AB-C3A22636F276", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F4D90857-AB13-47AF-B42A-7ADB190DB189", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*", matchCriteriaId: "804B2D7C-D890-4C4C-8A76-1760552E11BC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:a320_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6ADE5E80-06D3-4A1B-A655-FBB6CCA03939", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:a320:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FD5E05-3C58-465F-9D4F-ECC2CD78DCFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*", matchCriteriaId: "0D421A96-E6E9-4B27-ADE0-D8E87A82EEDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4F2D2745-242C-4603-899E-70C9025BDDD2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*", matchCriteriaId: "EFB4541D-5EF7-4266-BFF3-2DDEC95E8012", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B7FD1DA9-7980-4643-B378-7095892DA176", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*", matchCriteriaId: "347E9E3E-941C-4109-B59F-B9BB05486B34", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD661062-0D5B-4671-9D92-FEF8D7395C1E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*", matchCriteriaId: "8155BF5F-DD1B-4AB4-81F8-9BCE6A8821AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B36CECA5-4545-49C2-92EB-B739407B207F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*", matchCriteriaId: "D8E7549A-DE35-4274-B3F6-22D51C7A6613", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", matchCriteriaId: "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E6D335F3-297A-4554-A0DC-E21B32DB2942", versionEndExcluding: "10.0.0.162\\(c00e156r2p4\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-tl00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A6BCC614-F819-4848-A575-1EA8165ACA38", versionEndExcluding: "10.0.0.162\\(c01e156r1p4\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "E7918CD6-341B-4FCC-BD31-30B8952192C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2C3D122C-8B73-4D58-A82F-1A4AC75DD0A9", versionEndExcluding: "9.1.0.126\\(c00e126r1p7t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", matchCriteriaId: "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3CCF81FB-C379-4D15-9CA7-E59974F53B77", versionEndExcluding: "9.1.0.165\\(c00e165r2p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "43F6F4AE-1938-4E92-8DBD-A80B703EDCA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3E53657-BC96-4EB4-8AC5-865346E732CC", versionEndExcluding: "9.1.0.165\\(c00e165r2p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*", matchCriteriaId: "C56298B1-7923-44E1-B9D5-78C030792209", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ares-tl00chw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2934E6C1-FDAE-495B-9D02-8BD40B186F5F", versionEndExcluding: "8.2.0.163\\(c01r2p1\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ares-tl00chw:-:*:*:*:*:*:*:*", matchCriteriaId: "56A210C7-08C6-4FDA-951B-AA9DA99F97DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "118F23B4-3D14-47DA-8382-D2AA89516483", versionEndExcluding: "10.0.0.170\\(c786e170r2p4\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D6D9B-335B-404C-88F3-590DF9E5D878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "72254170-D96B-479B-86DD-9E9A93A7A675", versionEndExcluding: "9.1.0.300\\(c432e4r1p11t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F005F9E1-E61D-4559-AF6B-3ECFEDA687AF", versionEndExcluding: "10.0.0.170\\(c01e170r1p4\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5BFDE403-5A29-4A02-8E62-041E4A23ADD2", versionEndExcluding: "8.0.0.377\\(c00\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*", matchCriteriaId: "3FA823EC-2A56-4C48-8FB5-317B6ED81E40", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "865F26AC-8EA6-4003-953C-1FF933AC2A25", versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F36EF5C3-FF4A-4849-97C3-FD4BC05FBCD5", versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*", matchCriteriaId: "6CE70011-5F76-460B-ABB5-7C738B0AB2CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-al00a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B00FF2D-9E0B-4C38-9C6B-23052D7B6339", versionEndExcluding: "8.1.0.186\\(c00gt\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "1D4D3605-6171-437D-9319-068DC8E9E7E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "617327F7-0DFA-4239-BF02-FA0B22AAF6AF", versionEndExcluding: "9.1.0.325\\(c432e4r1p12t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E771D6E9-1177-4579-8065-8DC0BB6A73F8", versionEndExcluding: "9.1.0.321\\(c01e320r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*", matchCriteriaId: "73F60E9A-0ACB-4E44-ADFB-771C695FCF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:duke-l09i_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "88B97220-A86A-4F07-8DCA-9E44DBA7137F", versionEndExcluding: "9.0.1.171\\(c675e6r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:duke-l09i:-:*:*:*:*:*:*:*", matchCriteriaId: "90C6E2FE-741F-4241-A123-F6934948BB12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4", versionEndExcluding: "1.0.0.190\\(c00\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "DC591FA6-55E1-4628-AE43-CD1E2A4980E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:figo-al00a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "181B057A-E12F-44A7-BEF3-3D0F78D5BE7A", versionEndExcluding: "9.1.0.130\\(c00e115r2p8t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:figo-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "A1319FFD-91B6-4A56-BF45-256692D75FDD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AED8A17-5120-4F1F-819B-C2592FC73411", versionEndExcluding: "9.1.0.128\\(c00e112r1p6t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*", matchCriteriaId: "5DF7DFEE-5C99-4C65-B3D8-AEE21E81A6BA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:florida-l03_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "011099DF-3D08-417C-A4BE-838EC9755F48", versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:florida-l03:-:*:*:*:*:*:*:*", matchCriteriaId: "3D7A1E5A-A17C-4495-82A0-0A7C58185971", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A5627E2-1D73-40B2-A2E7-864AD016E07C", versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*", matchCriteriaId: "88CD5EEC-DA40-4B35-A2CD-6F48147F0810", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "49F91DCF-B3DF-4087-A608-0E6A06DE6FA4", versionEndExcluding: "9.1.0.150\\(c636e6r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*", matchCriteriaId: "D1387541-860F-43AE-809B-AFA9338DC378", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1E7E0ED-EB2E-4A55-B81D-8ECE3FD3AE58", versionEndExcluding: "9.1.0.128\\(c01e112r1p6t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*", matchCriteriaId: "4776C729-200A-4D86-B635-185B65FC2570", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:mate_rs_firmware:9.1.0.321\\(c786e320r1p1t8\\):*:*:*:*:*:*:*", matchCriteriaId: "887851AE-6FD5-4C7D-AAB5-2791E98DF578", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*", matchCriteriaId: "FBDD07EB-20AB-4E6F-B009-60A2C08C3B1C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E3A590F5-A49B-4752-9EF0-290A03055D67", versionEndExcluding: "9.1.0.312\\(c00e312r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*", matchCriteriaId: "7492911B-4242-4947-9DED-9F48FC0875CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "05A03D81-1266-40CF-8FB1-E91B02544D6B", versionEndExcluding: "9.1.0.200\\(c605e4r1p3t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C0D11586-3604-4609-8643-25778B8A239D", versionEndExcluding: "9.1.0.200\\(c635e5r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1B7E4CBB-A552-46F6-97C5-EA8C80B7E156", versionEndExcluding: "9.1.0.246\\(c432e6r1p7t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D327D03E-A9A5-4DEA-9E99-E21CD6FE352D", versionEndExcluding: "9.1.0.297\\(c605e4r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "F48ABE15-BC87-4B02-8B39-94DA1DC96B92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nova_2s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9017B3E4-3C5A-42B4-84E6-DF61C4E49DF0", versionEndExcluding: "9.1.0.210\\(c01e110r1p9t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nova_2s:-:*:*:*:*:*:*:*", matchCriteriaId: "564CA70A-8211-4C36-B8C6-CF29369E43D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "64C5F693-BB20-4061-8614-11BCD9F95117", versionEndExcluding: "9.1.0.351\\(c00e351r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*", matchCriteriaId: "BF68FFB0-01F8-4937-8BF4-36866F02E9A8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C2C2381E-886E-4992-873F-BF41B24AD4D7", versionEndExcluding: "9.1.0.200\\(c636e4r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8AD38BEC-57FC-468A-8AAF-B56408575E45", versionEndExcluding: "9.1.0.200\\(c636e4r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1733163A-DE27-488D-8A56-289A7AB629DC", versionEndExcluding: "9.1.0.201\\(c636e4r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DA5C946-EDC4-4219-B745-75388B292BF0", versionEndExcluding: "9.1.0.201\\(c636e4r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F6800926-B3F6-4820-8D05-1153F38A792A", versionEndExcluding: "9.1.0.201\\(zafc185e4r1p8t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9ABB62EE-FCEC-41E1-9640-A4E9D64B9819", versionEndExcluding: "9.1.0.201\\(zafc185e4r1p8t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3BB4FCB-BDB1-4EFD-BE78-F16D56B63CDD", versionEndExcluding: "10.1.0.214\\(c10e5r4p3\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2187FAFD-772A-4200-AB9E-067DC8422890", versionEndExcluding: "9.1.0.260\\(c00e120r2p2\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-tl00d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B6B7116-2FE3-4188-8E91-83365E15B5AF", versionEndExcluding: "9.1.0.219\\(c01e18r3p2t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*", matchCriteriaId: "566629E0-84F2-4DFA-A20E-2D20C472E4B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:leland-al10b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "10FD6A92-DCCC-413A-8871-2DB58E6ED2EE", versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:leland-al10b:-:*:*:*:*:*:*:*", matchCriteriaId: "4C42CB5B-492C-40B0-9230-B15F540B121B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:leland-l21a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9233AB6A-2075-4615-8EA1-6088238BE099", versionEndExcluding: "9.1.0.156\\(c185e5r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*", matchCriteriaId: "A663ACC5-FC2D-4FD7-BA9E-55344E257D4A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:leland-l32a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4626E56-367C-4C0A-B920-C4138FF557DC", versionEndExcluding: "9.1.0.153\\(c675e6r1p4t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*", matchCriteriaId: "B7704B5F-4164-477C-A528-2998092C81D0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:leland-tl10b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C54C4BF8-3F83-4E9C-8CD9-9F59B7BCD859", versionEndExcluding: "9.1.0.130\\(c01e112r2p10t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*", matchCriteriaId: "EDB8A667-95DE-4087-8418-49F5ACE194BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:leland-tl10c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2BA2E31-DAC3-4CD3-8578-1FA190B815A9", versionEndExcluding: "9.1.0.130\\(c01e112r2p10t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*", matchCriteriaId: "11CB58EA-972E-460F-95F4-5413E05DA04C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:lelandp-al00c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A27CC4DE-5A6A-40CD-BAE7-57B070B463EE", versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*", matchCriteriaId: "4BD659D6-F838-4668-901A-0C17AB18E7C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:lelandp-l22c_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "06C48B38-0555-4116-B19A-58CC5FF2C80C", versionEndExcluding: "9.1.0.156\\(c636e5r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*", matchCriteriaId: "80D7FA39-2EE4-49F8-9EF4-009304DB6108", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:neo-al00d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9DD3B902-FFD3-4F1D-8355-9DDC0A2C5275", versionEndExcluding: "9.1.0.321\\(c786e320r1p1t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*", matchCriteriaId: "B4B07FEC-514D-4A51-B26B-02254A867DC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4B4B9600-877F-458C-8E89-40E0B0D21E8A", versionEndExcluding: "10.1.0.160\\(c00e160r2p11\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", matchCriteriaId: "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:rhone-al00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "509E4F2C-2248-4B3B-8ABA-E52850E17B6C", versionEndExcluding: "8.0.0.376\\(c00\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*", matchCriteriaId: "4584E368-FDA6-41FD-923F-74A30E404967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:stanford-l09_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C3D3655-4B7C-4211-9F41-F01C34A8EB70", versionEndExcluding: "9.1.0.211\\(c635e2r1p4t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:stanford-l09:-:*:*:*:*:*:*:*", matchCriteriaId: "E1BE2AB5-C033-41E2-A1EF-9DCAE8F2120B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:stanford-l09s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D939D905-AD5E-4576-B381-921DA6FF7F57", versionEndExcluding: "9.1.0.210\\(c432e2r1p5t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*", matchCriteriaId: "E5091556-29A3-4781-A6CA-FB0BD03DEB01", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE6D5B81-ED8D-41C1-88DD-9FD23EBD1ABE", versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", matchCriteriaId: "66A35E71-4D6A-494D-882B-987CE16E3467", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA5AAC87-00E5-4C00-95F2-6D9A9300954A", versionEndExcluding: "9.1.0.212\\(c01e62r1p7t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*", matchCriteriaId: "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C93EE0CF-AFF9-40B8-B306-3BC86F679B90", versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", matchCriteriaId: "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1ECB2A68-D67D-492F-9803-7524D96B735B", versionEndExcluding: "10.0.0.175\\(c00e59r2p11\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E60D3DEC-EAEC-44AF-9CFC-6A2174C2D8D1", versionEndExcluding: "10.0.0.175\\(c01e59r2p11\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4BDC1976-E07B-4464-84DB-EACAE30D97E5", versionEndExcluding: "10.1.0.160\\(c00e160r8p12\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "562D05D2-CC9E-4973-9E8D-B40C0ED6C721", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2221682B-7C40-43F0-8BE4-64872D0388E6", versionEndExcluding: "10.1.0.231\\(c10e3r3p2\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", matchCriteriaId: "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B4C61685-A7A9-4E2E-BA7B-15A3C32B3F4B", versionEndExcluding: "10.1.0.160\\(c01e160r8p12\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "A4177D27-D234-4BBF-A4D9-1C0DCE5B322C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "687E4FF2-3AA5-4E10-9911-6634A77EDCF1", versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", matchCriteriaId: "F931151C-4D0A-44D1-9417-B467F7E148A2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095", }, { lang: "es", value: "Un uso de la memoria previamente liberada en el archivo binder.c, permite una elevación de privilegios desde una aplicación en el kernel de Linux. No es requerida una interacción del usuario para explotar esta vulnerabilidad, sin embargo, la explotación necesita de la instalación de una aplicación local maliciosa o una vulnerabilidad separada en una aplicación de red. Producto: Android; ID de Android: A-141720095", }, ], id: "CVE-2019-2215", lastModified: "2024-11-21T04:40:27.037", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-10-11T19:15:10.947", references: [ { source: "security@android.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", }, { source: "security@android.com", tags: [ "Patch", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { source: "security@android.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2019/Oct/38", }, { source: "security@android.com", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", }, { source: "security@android.com", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", }, { source: "security@android.com", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Nov/11", }, { source: "security@android.com", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191031-0005/", }, { source: "security@android.com", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2019-10-01", }, { source: "security@android.com", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4186-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2019/Oct/38", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Patch", "Third Party Advisory", ], url: "https://seclists.org/bugtraq/2019/Nov/11", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20191031-0005/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/2019-10-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/4186-1/", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-416", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-11-13 19:29
Modified
2024-11-21 04:12
Severity ?
Summary
Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | alp-al00b_firmware | 8.0.0.1.18d\(c00\) | |
huawei | alp-al00b | - | |
huawei | alp-tl00b_firmware | 8.0.0.1.18d\(c01\) | |
huawei | alp-tl00b | - | |
huawei | bla-al00b_firmware | 8.0.0.1.18d\(c00\) | |
huawei | bla-al00b | - | |
huawei | bla-l09c_firmware | 8.0.0.127\(c432\) | |
huawei | bla-l09c_firmware | 8.0.0.128\(c432\) | |
huawei | bla-l09c_firmware | 8.0.0.137\(c432\) | |
huawei | bla-l09c | - | |
huawei | bla-l29c_firmware | 8.0.0.127\(c432\) | |
huawei | bla-l29c_firmware | 8.0.0.137\(c432\) | |
huawei | bla-l29c | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-al00b_firmware:8.0.0.1.18d\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "D327AD65-437A-4DA9-B38E-FFE9147AAB82", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-tl00b_firmware:8.0.0.1.18d\\(c01\\):*:*:*:*:*:*:*", matchCriteriaId: "439861D3-3F70-4A8C-A2F0-99120207E3CF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "E7918CD6-341B-4FCC-BD31-30B8952192C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.1.18d\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "06F0F9A3-BC44-463E-BF84-593CAC5CBB45", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D6D9B-335B-404C-88F3-590DF9E5D878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-l09c_firmware:8.0.0.127\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "D2CADEF0-2830-4883-8B52-4BCE6B74DBF4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:bla-l09c_firmware:8.0.0.128\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "E4C168E2-2679-478D-815F-FD909FBE1B38", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:bla-l09c_firmware:8.0.0.137\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "87AC6AB6-B166-4098-98E1-79A6407DAFA5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-l09c:-:*:*:*:*:*:*:*", matchCriteriaId: "3C787E52-055B-4931-9B5C-604F1578A3A0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:8.0.0.127\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "BD8BD839-9468-4F62-A66B-25C1AF032D05", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:8.0.0.137\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "641C18E2-CB4A-4169-B836-B4CD171248EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone.", }, { lang: "es", value: "Algunos smartphones Huawei ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432) y 8.0.0.137(C432) tienen una vulnerabilidad de omisión de autenticación. Cuando el atacante obtiene el smartphone del usuario, la vulnerabilidad se puede emplear para reemplazar el programa de arranque para que el atacante pueda obtener la información en el smartphone y lograr controlarlo.", }, ], id: "CVE-2018-7910", lastModified: "2024-11-21T04:12:57.327", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-11-13T19:29:00.400", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-12-14 00:15
Modified
2024-11-21 04:44
Severity ?
Summary
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-al00b_firmware:8.0.0.153\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "00A30EA6-84A9-4549-8CA5-5E3F833C4A46", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:alp-tl00b_firmware:8.0.0.129\\(sp2c01\\):*:*:*:*:*:*:*", matchCriteriaId: "19236304-3FC9-4377-B03E-5197CEA6A3A4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "E7918CD6-341B-4FCC-BD31-30B8952192C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.129\\(sp2c786\\):*:*:*:*:*:*:*", matchCriteriaId: "99627A07-1127-4F96-B694-D2F4388BEF7E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.153\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "E47AF090-F5FB-46CA-BEBA-7C465083CA72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "B11D6D9B-335B-404C-88F3-590DF9E5D878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:bla-tl00b_firmware:8.0.0.129\\(sp2c01\\):*:*:*:*:*:*:*", matchCriteriaId: "EE5185C7-F99C-471C-9718-CC08FFEA49A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:charlotte-al00a_firmware:8.1.0.176\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "332ABD26-1EC2-40E3-A329-481914DAA717", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:charlotte-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "BC9EFA36-508E-42A6-83A5-D94273265400", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:charlotte-tl00b_firmware:8.1.0.176\\(c01\\):*:*:*:*:*:*:*", matchCriteriaId: "B57C9502-D755-4431-A097-FD485794B133", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:charlotte-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "31979014-C70F-49E9-A37F-A2A622AE9252", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-al10b_firmware:8.1.0.163\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "80721EA2-C5AE-4BD0-877C-43BB508A462F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", matchCriteriaId: "2F63CA2F-45B8-4DD3-81AE-8359929AE50B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-al10i_firmware:8.1.0.150\\(c675custc675d2\\):*:*:*:*:*:*:*", matchCriteriaId: "0119A5C2-D99B-43BE-A541-F067044866FE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*", matchCriteriaId: "DFF16336-9CFE-4D67-852B-4C356E3C5951", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.146\\(c461\\):*:*:*:*:*:*:*", matchCriteriaId: "EAB4D5D8-F919-403D-9209-63C06FD21923", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.148\\(c185\\):*:*:*:*:*:*:*", matchCriteriaId: "920A33BF-DFDB-40A1-B893-3815C77A3751", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\\(c10\\):*:*:*:*:*:*:*", matchCriteriaId: "CF676A0A-0446-431B-81B3-E14149E1D764", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\\(c432\\):*:*:*:*:*:*:*", matchCriteriaId: "004FB686-8DE9-4C7A-BEBE-F37043F50A67", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:columbia-tl00d_firmware:8.1.0.186\\(c01gt\\):*:*:*:*:*:*:*", matchCriteriaId: "7A6BCE3A-F806-48FE-8F22-FB77EA671584", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*", matchCriteriaId: "6BE1BB06-0403-4F46-AF76-DAD85D538907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "6C3DEAC5-9F49-4967-BCD4-DCF58ACCBC61", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0FE97479-E4F0-4C87-B6EE-EE4AE685DE5A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:elle-tl00b_firmware:9.1.0.162\\(c01e160r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "20316EA5-6D3C-4AC9-BBBB-621E12B4A437", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:elle-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "678B1753-1005-489F-B30A-76C49803FA5D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:emily-al00a_firmware:8.1.0.190\\(c00\\):*:*:*:*:*:*:*", matchCriteriaId: "4080BCCB-AE47-42D1-9570-989A20A2B0F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:emily-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "8AC84A74-7F01-4434-896C-B9B595984F23", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:emily-tl00b_firmware:8.1.0.175\\(c01\\):*:*:*:*:*:*:*", matchCriteriaId: "2648D7A0-CE4D-4EAB-B571-407F46564D9F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:emily-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "010C3645-3C82-47F0-908C-9B4CFFC503CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ever-al00b_firmware:9.0.0.195\\(c00e195r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "66AEE44E-3E9A-45B5-9CB9-B9F0CDB4BE8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ever-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "264C7F11-D6CC-4DF7-8607-736179618A50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.206\\(c185e3r3p1\\):*:*:*:*:*:*:*", matchCriteriaId: "AB598092-85FC-4E96-A870-ACC2EF592D2F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.207\\(c636e3r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "DD1835B9-E25A-41DB-BB2C-9DD3603D4025", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.208\\(c432e3r1p12\\):*:*:*:*:*:*:*", matchCriteriaId: "33553334-B4C0-42D0-8185-FD4337F54011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", matchCriteriaId: "AEB4EC14-14DE-4AAF-A951-071B4E39270A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:harry-al00c_firmware:9.1.0.206\\(c00e205r3p1\\):*:*:*:*:*:*:*", matchCriteriaId: "57CD42F9-7611-452E-AD1C-E14493A02A70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*", matchCriteriaId: "9DF9FAC4-0A8C-463C-8E5C-64E33D145E52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C41532B6-FE2A-4174-B1AA-074F08B64DEC", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:harry-al10b_firmware:9.1.0.206\\(c00e205r3p1\\):*:*:*:*:*:*:*", matchCriteriaId: "5395F144-E845-4AB2-A8AC-7A43BE3912A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*", matchCriteriaId: "1A2BE361-1412-455E-A553-0CA9D14E4C1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:harry-tl00c_firmware:9.0.1.162\\(c01e160r2p3\\):*:*:*:*:*:*:*", matchCriteriaId: "DE8ADA57-076D-49BE-A354-25B95F1A676C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*", matchCriteriaId: "E31013C1-26DA-4A6D-BBD4-BF0630EEEB66", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:hima-al00b_firmware:9.0.0.200\\(c00e200r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "5DEC5474-D927-456A-8F9D-C854BDB7F968", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:hima-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "8C0592A2-8087-4847-8586-04ED842960D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:jackman-l21_firmware:8.2.0.160\\(c185\\):*:*:*:*:*:*:*", matchCriteriaId: "39F76953-3CB3-4CCF-A3A3-15267E9A49DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:jackman-l21:-:*:*:*:*:*:*:*", matchCriteriaId: "15F105E1-6077-4FF3-8AD2-472A5DB68CA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:jackman-l22_firmware:8.2.0.156\\(c636r2p2\\):*:*:*:*:*:*:*", matchCriteriaId: "3CEC1CAE-7461-4A57-B31D-98C16167B2B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:jackman-l22:-:*:*:*:*:*:*:*", matchCriteriaId: "B99E236E-D36C-4FE9-93C2-10D01A3A7390", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.152\\(c45custc45d1\\):*:*:*:*:*:*:*", matchCriteriaId: "41A59832-A342-449F-B4DC-4D4305F62ECF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.162\\(c605\\):*:*:*:*:*:*:*", matchCriteriaId: "9085E680-5AD9-42C6-8DAF-EDEC1E64AC75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:jackman-l23:-:*:*:*:*:*:*:*", matchCriteriaId: "AAB9A357-16B3-4CEE-B235-5B1E951D6719", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-al00ic_firmware:8.2.0.161\\(c675custc675d1\\):*:*:*:*:*:*:*", matchCriteriaId: "5D822874-5669-40AA-8113-7BEF544F80D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-al00ic:-:*:*:*:*:*:*:*", matchCriteriaId: "8844A56E-E1F2-4CD1-8E81-A4365CF10E41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-al10c_firmware:8.2.0.165\\(c00r1p16\\):*:*:*:*:*:*:*", matchCriteriaId: "27F82E49-446A-4E37-B340-11A8BEA77EC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-al10c:-:*:*:*:*:*:*:*", matchCriteriaId: "478E7A4C-C1EC-4D13-B06A-CA8E57C2690B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.130\\(c461r1p1\\):*:*:*:*:*:*:*", matchCriteriaId: "496C59DA-9104-4C6C-BBB6-6E522D98CF81", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.131\\(c10r2p2\\):*:*:*:*:*:*:*", matchCriteriaId: "24B9D430-FB96-45A3-A928-F7A7BCE4AFA4", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.136\\(c432custc432d1\\):*:*:*:*:*:*:*", matchCriteriaId: "B55EFA94-43FA-442D-9D75-189BFC2368BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l21c:-:*:*:*:*:*:*:*", matchCriteriaId: "067613ED-432F-457D-929E-238462AC53AD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\\(c10custc10d1\\):*:*:*:*:*:*:*", matchCriteriaId: "59A49059-37AB-448A-A5E4-592120B6F0DF", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\\(c432custc432d1\\):*:*:*:*:*:*:*", matchCriteriaId: "B554E747-6A9A-4EDC-A743-72891D34B4E7", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.131\\(c55custc55d1\\):*:*:*:*:*:*:*", matchCriteriaId: "CC9F79F8-8042-429B-9329-91B631E6FD40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l21d:-:*:*:*:*:*:*:*", matchCriteriaId: "EFDAF471-1498-4856-9ECD-8FB3F809D01E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.105\\(c185r1p1\\):*:*:*:*:*:*:*", matchCriteriaId: "3800398A-9704-4380-A329-D4911D73AB5E", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.107\\(c636r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "BA8F1D00-5BBF-43AD-8C92-D6FF6E5B2819", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l22c:-:*:*:*:*:*:*:*", matchCriteriaId: "BC60D552-5519-4020-9C45-E2EBC3700693", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.105\\(c185r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "1455033B-FF7E-44B4-8ECF-250D961D4B49", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.107\\(c636r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "636275C8-D825-4C66-BEFB-BB91BA8EB38D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l22d:-:*:*:*:*:*:*:*", matchCriteriaId: "1AB32655-E8FE-4058-B31C-052E609746C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.130\\(c636custc636d2\\):*:*:*:*:*:*:*", matchCriteriaId: "0309BA64-78C5-4790-84AC-AE38F9080F91", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.133\\(c605custc605d1\\):*:*:*:*:*:*:*", matchCriteriaId: "C0DC6487-720E-4722-A864-1FB7B5FB351C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l23c:-:*:*:*:*:*:*:*", matchCriteriaId: "2EF62125-1E21-47BE-835A-61243E3F690F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l42ic_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "A014F6CA-21F5-40C1-A2B0-DBE4FBC262D8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l42ic:-:*:*:*:*:*:*:*", matchCriteriaId: "F72F9B44-B835-4A93-A2D0-1B1FF8FEA81F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l42ie_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "1446494D-014E-4F07-AE60-F89C7EA56C0C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l42ie:-:*:*:*:*:*:*:*", matchCriteriaId: "3C91EE9E-C333-4D02-9184-29631948D0FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-l42if_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "28656199-3BC2-4847-9468-D323DB37199E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-l42if:-:*:*:*:*:*:*:*", matchCriteriaId: "2EFE0746-31FB-4151-8D70-AAE0611CCDFD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.100\\(c541custc541d1\\):*:*:*:*:*:*:*", matchCriteriaId: "07548F3F-D36D-457B-9899-92BCBEF91B5F", vulnerable: true, }, { criteria: "cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.165\\(c01r1p16\\):*:*:*:*:*:*:*", matchCriteriaId: "8B4713A6-FF22-40C7-896E-C0D626AF6D2A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*", matchCriteriaId: "566629E0-84F2-4DFA-A20E-2D20C472E4B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:johnson-tl00f_firmware:8.2.0.100\\(c541custc541d1\\):*:*:*:*:*:*:*", matchCriteriaId: "3563E6B0-881E-4854-99F5-196C7A7AA595", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*", matchCriteriaId: "0075F84C-492C-408D-941B-274A0A0C3B82", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:laya-al00ep_firmware:9.0.0.201\\(c786e200r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "68BB4A88-06F2-46E5-B03A-A4450CA7CE40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*", matchCriteriaId: "5B3A54AE-DC30-429B-8FB8-BE6EB933E685", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:neo-al00d_firmware:8.1.0.175\\(c786\\):*:*:*:*:*:*:*", matchCriteriaId: "581A0F86-A651-48E7-930A-3BD773C1AF0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*", matchCriteriaId: "B4B07FEC-514D-4A51-B26B-02254A867DC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:potter-al00c_firmware:9.1.0.208\\(c00e205r3p1\\):*:*:*:*:*:*:*", matchCriteriaId: "17A2F928-6CF8-408B-B3F4-CED7441B8307", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*", matchCriteriaId: "34141B01-DA8B-4029-B275-395AC11C40C4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:potter-al10a_firmware:9.1.0.208\\(c00e205r3p1\\):*:*:*:*:*:*:*", matchCriteriaId: "AEAE9002-378D-4466-AB62-A190C34AD61F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*", matchCriteriaId: "0CF01A3C-2E60-45B8-8D4E-58B5710FC40C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:princeton-al10b_firmware:9.1.0.211\\(c00e203r2p2\\):*:*:*:*:*:*:*", matchCriteriaId: "EE3A7EB6-8CC6-40CB-93B0-129E7E7A2483", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", matchCriteriaId: "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:princeton-al10d_firmware:9.1.0.212\\(c00e204r2p2\\):*:*:*:*:*:*:*", matchCriteriaId: "A5EC9D33-A11F-4F8F-BE37-9B8C4263EF95", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*", matchCriteriaId: "11E6B825-CA55-4BEC-8279-3F33F7CC93EE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:princeton-al10i_firmware:9.0.1.150\\(c675e9r1p4\\):*:*:*:*:*:*:*", matchCriteriaId: "10A41D90-90FC-41C2-A5A3-B1A5CF7FB54D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:princeton-al10i:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E9766B-FFB3-47F0-9C55-57F1C268109C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:princeton-tl10c_firmware:9.1.0.211\\(c01e203r2p2\\):*:*:*:*:*:*:*", matchCriteriaId: "CF0B7171-505A-4A24-8861-2533F9F10011", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*", matchCriteriaId: "35F6A54F-E004-4BE7-A6A6-3E7C300DC498", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tony-al00b_firmware:9.1.0.206\\(c00e200r2p3\\):*:*:*:*:*:*:*", matchCriteriaId: "4961A11C-A7A7-4AA1-BC36-F0D9FECC37B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", matchCriteriaId: "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:tony-tl00b_firmware:9.1.0.206\\(c01e200r2p3\\):*:*:*:*:*:*:*", matchCriteriaId: "AD232463-90AA-42BF-A569-F5BE483F27E9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vogue-al00a_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "D7B24E79-5313-4151-B2F3-11A411AF25C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vogue-al00a:-:*:*:*:*:*:*:*", matchCriteriaId: "973B0865-F7A6-4851-BEBE-6026E54CC04F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vogue-al00a-preload_firmware:9.1.0.12\\(c00r1\\):*:*:*:*:*:*:*", matchCriteriaId: "62F817EB-12AA-472D-8607-299352831E71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vogue-al00a-preload:-:*:*:*:*:*:*:*", matchCriteriaId: "373003A1-4308-45DD-8A8D-607CEE7BBBFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vogue-al10c_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "EADD0609-5B61-4605-B015-B0BF67E1D037", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vogue-al10c:-:*:*:*:*:*:*:*", matchCriteriaId: "CD081515-6391-40B5-BAE5-162DFE3E2C30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vogue-al10c-preload_firmware:9.1.0.12\\(c00r1\\):*:*:*:*:*:*:*", matchCriteriaId: "CC4DDD74-425B-4BA0-A64E-3E2300518EBB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vogue-al10c-preload:-:*:*:*:*:*:*:*", matchCriteriaId: "71FCE443-E810-4011-AE70-117F37A18CFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:huawei:vogue-tl00b_firmware:9.1.0.162\\(c01e160r2p1\\):*:*:*:*:*:*:*", matchCriteriaId: "865A13F6-B4F0-432D-8328-05E9D10A0FF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:huawei:vogue-tl00b:-:*:*:*:*:*:*:*", matchCriteriaId: "264C6E15-84C8-40D3-895D-15736062439F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.", }, { lang: "es", value: "Algunos teléfonos inteligentes Huawei tienen una vulnerabilidad de desreferencia del puntero null. Un atacante crea paquetes específicos y los envía al producto afectado para explotar esta vulnerabilidad. La explotación con éxito puede causar que el teléfono afectado sea anormal.", }, ], id: "CVE-2019-5235", lastModified: "2024-11-21T04:44:34.617", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-12-14T00:15:10.977", references: [ { source: "psirt@huawei.com", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", }, ], sourceIdentifier: "psirt@huawei.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-476", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2018-7910
Vulnerability from cvelistv5
Published
2018-11-13 19:00
Modified
2024-08-05 06:37
Severity ?
EPSS score ?
Summary
Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei Technologies Co., Ltd. | ALP-AL00B, ALP-TL00B, BLA-AL00B, BLA-L09C, BLA-L29C |
Version: ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T06:37:59.598Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "ALP-AL00B, ALP-TL00B, BLA-AL00B, BLA-L09C, BLA-L29C", vendor: "Huawei Technologies Co., Ltd.", versions: [ { status: "affected", version: "ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432)", }, ], }, ], datePublic: "2018-11-01T00:00:00", descriptions: [ { lang: "en", value: "Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone.", }, ], problemTypes: [ { descriptions: [ { description: "authentication bypass", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-11-13T18:57:01", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2018-7910", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ALP-AL00B, ALP-TL00B, BLA-AL00B, BLA-L09C, BLA-L29C", version: { version_data: [ { version_value: "ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432)", }, ], }, }, ], }, vendor_name: "Huawei Technologies Co., Ltd.", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Some Huawei smartphones ALP-AL00B 8.0.0.118D(C00), ALP-TL00B 8.0.0.118D(C01), BLA-AL00B 8.0.0.118D(C00), BLA-L09C 8.0.0.127(C432), 8.0.0.128(C432), 8.0.0.137(C432), BLA-L29C 8.0.0.129(C432), 8.0.0.137(C432) have an authentication bypass vulnerability. When the attacker obtains the user's smartphone, the vulnerability can be used to replace the start-up program so that the attacker can obtain the information in the smartphone and achieve the purpose of controlling the smartphone.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "authentication bypass", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181101-01-bypass-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2018-7910", datePublished: "2018-11-13T19:00:00", dateReserved: "2018-03-09T00:00:00", dateUpdated: "2024-08-05T06:37:59.598Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-5235
Vulnerability from cvelistv5
Published
2019-12-13 23:09
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B |
Version: Version Version: 9.1.0.206(C00E205R3P1) Version: 9.0.1.5(C735R1) Version: 9.1.0.1(C00R3) Version: 9.1.0.206 Version: 9.0.1.162(C01E160R2P3) Version: 8.2.0.170(C861) Version: 8.2.0.188(C00R2P1) Version: 8.2.0.163(C605) Version: 8.2.0.160(C185) Version: 8.2.0.156(C636R2P2) Version: 8.2.0.152(C45CUSTC45D1) Version: 8.2.0.162(C605) Version: 8.2.0.175(C00R2P4) Version: 8.2.0.190(C788R1P16) Version: 8.2.0.161(C675CUSTC675D1) Version: 8.2.0.165(C00R1P16) Version: 8.2.0.130(C461R1P1) Version: 8.2.0.130(C652CUSTC652D1) Version: 8.2.0.131(C10R2P2) Version: 8.2.0.136(C432CUSTC432D1) Version: 8.2.0.101(C10CUSTC10D1) Version: 8.2.0.101(C432CUSTC432D1) Version: 8.2.0.131(C55CUSTC55D1) Version: 8.2.0.105(C185R1P1) Version: 8.2.0.107(C636R2P1) Version: 8.2.0.103(C652CUSTC652D1) Version: 8.2.0.105(C185R2P1) Version: 8.2.0.130(C636CUSTC636D2) Version: 8.2.0.133(C605CUSTC605D1) Version: 8.2.0.155(C675R2P1) Version: 8.2.0.110(C652CUSTC652D1) Version: 8.2.0.100(C541CUSTC541D1) Version: 8.2.0.165(C01R1P16) Version: 9.1.0.208(C00E205R3P1) Version: 9.1.0.162(C00E160R2P1) Version: 9.1.0.12(C00R1) Version: 9.1.0.4(C735R1) Version: 9.1.0.162 Version: 9.1.0.161 Version: 9.1.0.162(C01E160R2P1) |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:47:56.874Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", vendor: "n/a", versions: [ { status: "affected", version: "Version", }, { status: "affected", version: "9.1.0.206(C00E205R3P1)", }, { status: "affected", version: "9.0.1.5(C735R1)", }, { status: "affected", version: "9.1.0.1(C00R3)", }, { status: "affected", version: "9.1.0.206", }, { status: "affected", version: "9.0.1.162(C01E160R2P3)", }, { status: "affected", version: "8.2.0.170(C861)", }, { status: "affected", version: "8.2.0.188(C00R2P1)", }, { status: "affected", version: "8.2.0.163(C605)", }, { status: "affected", version: "8.2.0.160(C185)", }, { status: "affected", version: "8.2.0.156(C636R2P2)", }, { status: "affected", version: "8.2.0.152(C45CUSTC45D1)", }, { status: "affected", version: "8.2.0.162(C605)", }, { status: "affected", version: "8.2.0.175(C00R2P4)", }, { status: "affected", version: "8.2.0.190(C788R1P16)", }, { status: "affected", version: "8.2.0.161(C675CUSTC675D1)", }, { status: "affected", version: "8.2.0.165(C00R1P16)", }, { status: "affected", version: "8.2.0.130(C461R1P1)", }, { status: "affected", version: "8.2.0.130(C652CUSTC652D1)", }, { status: "affected", version: "8.2.0.131(C10R2P2)", }, { status: "affected", version: "8.2.0.136(C432CUSTC432D1)", }, { status: "affected", version: "8.2.0.101(C10CUSTC10D1)", }, { status: "affected", version: "8.2.0.101(C432CUSTC432D1)", }, { status: "affected", version: "8.2.0.131(C55CUSTC55D1)", }, { status: "affected", version: "8.2.0.105(C185R1P1)", }, { status: "affected", version: "8.2.0.107(C636R2P1)", }, { status: "affected", version: "8.2.0.103(C652CUSTC652D1)", }, { status: "affected", version: "8.2.0.105(C185R2P1)", }, { status: "affected", version: "8.2.0.130(C636CUSTC636D2)", }, { status: "affected", version: "8.2.0.133(C605CUSTC605D1)", }, { status: "affected", version: "8.2.0.155(C675R2P1)", }, { status: "affected", version: "8.2.0.110(C652CUSTC652D1)", }, { status: "affected", version: "8.2.0.100(C541CUSTC541D1)", }, { status: "affected", version: "8.2.0.165(C01R1P16)", }, { status: "affected", version: "9.1.0.208(C00E205R3P1)", }, { status: "affected", version: "9.1.0.162(C00E160R2P1)", }, { status: "affected", version: "9.1.0.12(C00R1)", }, { status: "affected", version: "9.1.0.4(C735R1)", }, { status: "affected", version: "9.1.0.162", }, { status: "affected", version: "9.1.0.161", }, { status: "affected", version: "9.1.0.162(C01E160R2P1)", }, ], }, ], descriptions: [ { lang: "en", value: "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.", }, ], problemTypes: [ { descriptions: [ { description: "null pointer dereference", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-12-13T23:09:32", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5235", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", version: { version_data: [ { version_value: "Version", }, { version_value: "9.1.0.206(C00E205R3P1)", }, { version_value: "9.0.1.5(C735R1)", }, { version_value: "9.1.0.1(C00R3)", }, { version_value: "9.1.0.206(C00E205R3P1)", }, { version_value: "9.1.0.206", }, { version_value: "9.0.1.162(C01E160R2P3)", }, { version_value: "8.2.0.170(C861)", }, { version_value: "8.2.0.188(C00R2P1)", }, { version_value: "8.2.0.163(C605)", }, { version_value: "8.2.0.160(C185)", }, { version_value: "8.2.0.156(C636R2P2)", }, { version_value: "8.2.0.152(C45CUSTC45D1)", }, { version_value: "8.2.0.162(C605)", }, { version_value: "8.2.0.175(C00R2P4)", }, { version_value: "8.2.0.190(C788R1P16)", }, { version_value: "8.2.0.161(C675CUSTC675D1)", }, { version_value: "8.2.0.165(C00R1P16)", }, { version_value: "8.2.0.130(C461R1P1)", }, { version_value: "8.2.0.130(C652CUSTC652D1)", }, { version_value: "8.2.0.131(C10R2P2)", }, { version_value: "8.2.0.136(C432CUSTC432D1)", }, { version_value: "8.2.0.101(C10CUSTC10D1)", }, { version_value: "8.2.0.101(C432CUSTC432D1)", }, { version_value: "8.2.0.131(C55CUSTC55D1)", }, { version_value: "8.2.0.105(C185R1P1)", }, { version_value: "8.2.0.107(C636R2P1)", }, { version_value: "8.2.0.103(C652CUSTC652D1)", }, { version_value: "8.2.0.105(C185R2P1)", }, { version_value: "8.2.0.107(C636R2P1)", }, { version_value: "8.2.0.130(C636CUSTC636D2)", }, { version_value: "8.2.0.133(C605CUSTC605D1)", }, { version_value: "8.2.0.155(C675R2P1)", }, { version_value: "8.2.0.155(C675R2P1)", }, { version_value: "8.2.0.110(C652CUSTC652D1)", }, { version_value: "8.2.0.155(C675R2P1)", }, { version_value: "8.2.0.100(C541CUSTC541D1)", }, { version_value: "8.2.0.165(C01R1P16)", }, { version_value: "8.2.0.100(C541CUSTC541D1)", }, { version_value: "9.1.0.208(C00E205R3P1)", }, { version_value: "9.1.0.208(C00E205R3P1)", }, { version_value: "9.1.0.162(C00E160R2P1)", }, { version_value: "9.1.0.12(C00R1)", }, { version_value: "9.1.0.4(C735R1)", }, { version_value: "9.1.0.162(C00E160R2P1)", }, { version_value: "9.1.0.12(C00R1)", }, { version_value: "9.1.0.162", }, { version_value: "9.1.0.161", }, { version_value: "9.1.0.162(C01E160R2P1)", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "null pointer dereference", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", refsource: "MISC", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5235", datePublished: "2019-12-13T23:09:32", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:47:56.874Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-2215
Vulnerability from cvelistv5
Published
2019-10-11 18:16
Modified
2024-08-04 18:42
Severity ?
EPSS score ?
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
References
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2019-10-01 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Oct/38 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html | x_refsource_MISC | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20191031-0005/ | x_refsource_CONFIRM | |
https://seclists.org/bugtraq/2019/Nov/11 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | x_refsource_MISC | |
https://usn.ubuntu.com/4186-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html | mailing-list, x_refsource_MLIST | |
http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html | mailing-list, x_refsource_MLIST |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:42:50.933Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://source.android.com/security/bulletin/2019-10-01", }, { name: "20191018 CVE 2019-2215 Android Binder Use After Free", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Oct/38", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20191031-0005/", }, { name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Nov/11", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "USN-4186-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4186-1/", }, { name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", }, { name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Android", vendor: "n/a", versions: [ { status: "affected", version: "Kernel", }, ], }, ], descriptions: [ { lang: "en", value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095", }, ], problemTypes: [ { descriptions: [ { description: "Elevation of privilege", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-02T19:06:43", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://source.android.com/security/bulletin/2019-10-01", }, { name: "20191018 CVE 2019-2215 Android Binder Use After Free", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Oct/38", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20191031-0005/", }, { name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Nov/11", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "USN-4186-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4186-1/", }, { name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", }, { name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2019-2215", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Kernel", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Elevation of privilege", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/2019-10-01", refsource: "CONFIRM", url: "https://source.android.com/security/bulletin/2019-10-01", }, { name: "20191018 CVE 2019-2215 Android Binder Use After Free", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Oct/38", }, { name: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", }, { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", }, { name: "https://security.netapp.com/advisory/ntap-20191031-0005/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20191031-0005/", }, { name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Nov/11", }, { name: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", }, { name: "USN-4186-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4186-1/", }, { name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html", }, { name: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", }, { name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2019-2215", datePublished: "2019-10-11T18:16:48", dateReserved: "2018-12-10T00:00:00", dateUpdated: "2024-08-04T18:42:50.933Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }