All the vulnerabilites related to huawei - columbia-tl00b_firmware
Vulnerability from fkie_nvd
Published
2020-05-21 15:15
Modified
2024-11-21 05:39
Severity ?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61FF27C-1D5A-414C-88BE-A4E1567D57E3", "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7BA6CC3-74ED-4936-B5F3-09AE0942D7F1", "versionEndExcluding": "10.0.1.1\\(c675r1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E7A9EC-D51E-4E00-9E20-397405DD405E", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1259623C-9765-4A03-B984-71BC23832EA5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5021FFF9-39E9-4392-8F7B-77C99AD9021B", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "192D571A-3612-48FF-AD58-F85C05109DB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99350875-103C-4E3D-A3F1-CB51A3F04CAB", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "541F6EEE-365C-4317-BE40-5D1780023B37", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "272588E3-15DA-48C5-B5EA-E53D981294B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78009F5F-1CC7-41D5-B3D7-DFDD6888CF98", "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A597E29-2CFE-4D6F-8141-D0A8A04C7BF9", "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01770930-E2A3-4759-8367-4DAA53046B20", "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93DD848A-F0E2-4064-BB74-9FC5C82157AB", "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*", "matchCriteriaId": "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BE98F19-5883-4C1F-892E-4AEF2DB7EDB0", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "392304B7-F9CD-44B4-88FB-353A650DB700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01371306-680F-4007-8E5A-865C67D657E5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA3F67-7545-444D-BCCB-133B6680F3A7", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D3BD34-4095-4730-995D-5731A0BB8BF9", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E7101C-170D-4EA2-96A7-410AE55137BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23D525C1-B8A9-422B-A315-73BF6D4DEF7B", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EAA19C-B250-4809-BE4A-4575D5F793A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "738EA159-65D7-42FE-B29F-1890F93A1A5D", "versionEndExcluding": "10.0.3.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDF3E0C-594B-48BF-8E9F-4A10A11D5449", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0571923-C1D0-4F06-AD1E-9D43F5290B74", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "B611DA7B-A2E3-44A3-BC8B-C43308EF3E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" }, { "lang": "es", "value": "Hay una vulnerabilidad de filtrado de informaci\u00f3n en algunos productos Huawei. Un atacante adyacente no autenticado podr\u00eda explotar esta vulnerabilidad para descifrar datos. Las versiones de producto afectadas incluyen: Anne-AL00 Versiones anteriores a la versi\u00f3n 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versiones anteriores a la versi\u00f3n 10.0.1.1(C675R1); CD16-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.han 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versiones anteriores a la versi\u00f3n 10.0.0.185(C605E3R1P3), Versiones anteriores a la versi\u00f3n 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versiones anteriores a la versi\u00f3n 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00AY Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00BX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-L03BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); Marie-L21BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C432E4R4P1), V 10.0.0.188(C461E5R3P1); Marie-L22BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C636E3R3P1); Marie-L23BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); TC5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-11 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-12 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-17 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5800-10 Versiones anteriores a la versi\u00f3n 10.0.3.27; WS6500-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS6500-16 Versiones anteriores a la versi\u00f3n 10.0.2.8" } ], "id": "CVE-2020-9069", "lastModified": "2024-11-21T05:39:57.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-21T15:15:10.123", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-03-10 20:15
Modified
2024-11-21 04:52
Severity ?
Summary
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
References
Impacted products
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCEFDA14-C332-4604-85E5-332231B8853B", "versionEndExcluding": "10.0.0.177\\(c10e3r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "046C3C00-63A5-4CA9-9BFA-DEDF7D3A1D90", "versionEndExcluding": "10.0.0.178\\(c00e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F63CA2F-45B8-4DD3-81AE-8359929AE50B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3135BBC7-2A18-47E9-9041-16077B1102A2", "versionEndExcluding": "10.0.0.177\\(c10e4r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E8C828-0C05-4CD7-BC72-98AC05C6DDE5", "versionEndExcluding": "10.0.0.178\\(c01e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "142A8425-13E2-4215-80B6-80921BA7B3C1", "versionEndExcluding": "10.0.0.178\\(c01e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE1BB06-0403-4F46-AF76-DAD85D538907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BD55A2A-8A54-4E48-B352-F7042BBF2C3F", "versionEndExcluding": "9.1.0.340\\(c00e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB5193B7-6F3F-4249-BB74-62480893CAB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8DF2BE8-65FB-43DF-9FCD-E79C7DF0BB16", "versionEndExcluding": "9.1.0.340\\(c01e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F60E9A-0ACB-4E44-ADFB-771C695FCF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4", "versionEndExcluding": "1.0.0.190\\(c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC591FA6-55E1-4628-AE43-CD1E2A4980E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15E9683F-8037-418C-90AB-7ABDB6BE13BD", "versionEndExcluding": "10.0.0.194\\(c636e3r3p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E2BCA7E-E555-45D1-807A-F53682B0C383", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD39CEB3-C282-4988-A642-58E41C8DDDED", "versionEndExcluding": "9.1.0.290\\(c185e5r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F27CB3A-F773-48FB-9CAE-20FC93273D21", "versionEndExcluding": "9.1.0.338\\(c00e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF68FFB0-01F8-4937-8BF4-36866F02E9A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE1E4E8B-0AD9-498D-81F3-13211D9E683E", "versionEndExcluding": "10.0.0.160\\(c01e32r2p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D1E240-F1DE-4FC0-84B7-873978A9A6B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2128BDE5-AE3B-427E-8A25-F3065850206A", "versionEndExcluding": "9.1.0.291\\(c185e3r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43BBA181-3DDA-4BE0-A21E-FCBE2FB39BAA", "versionEndExcluding": "10.0.0.198\\(c432e10r3p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12799AD-C7F4-4F02-9BF6-93EB2BE69744", "versionEndExcluding": "9.1.0.251\\(c00e106r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB6F70FE-53A7-439A-8423-9BA3CB6A9510", "versionEndExcluding": "9.1.0.146\\(c00e131r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "38E3A00A-6EB8-4E04-B1BC-E7663C9C1EA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFB71A-0A0A-458E-A035-A353BB4A8894", "versionEndExcluding": "9.1.0.160\\(c00e150r1p7\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF2ED42-43B8-4586-913A-62607E458BDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FDE93D9-3B6C-4630-AFEF-77184BA570C5", "versionEndExcluding": "9.1.0.261\\(c00e120r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE8B2A97-DA47-40C8-8DB5-1AE1A89559A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D85AB1CB-E1A8-49C2-A49E-DB0624ACE41B", "versionEndExcluding": "9.1.0.380\\(c636e1r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*", "matchCriteriaId": "143485B2-5216-4190-8306-63D12362F6AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AC6D9E1-DC06-4CB7-9E0D-8BABCB5F331F", "versionEndExcluding": "10.0.0.194\\(c00e61r4p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96856831-31DE-4853-B1B9-9B666BB861F1", "versionEndExcluding": "9.1.0.237\\(c00e80r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A35E71-4D6A-494D-882B-987CE16E3467", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC6C2354-5777-40FE-99A4-51AF4233B139", "versionEndExcluding": "9.1.0.237\\(c01e80r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "905B9A20-E643-4E82-B918-6067398A0E25", "versionEndExcluding": "10.0.0.159\\(c00e64r1p5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B310F0-9165-48E3-9609-6CA49D6E10C5", "versionEndExcluding": "10.1.0.137\\(c00e137r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D4E2493-F5E5-4DB3-BD0F-87A8B07A3BBD", "versionEndExcluding": "10.0.0.196\\(c01e65r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0993FFB0-E860-437B-94AF-5D80D7598F5B", "versionEndExcluding": "10.0.0.196\\(c00e62r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "562D05D2-CC9E-4973-9E8D-B40C0ED6C721", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8C81625-2725-4B62-9DB5-7FC9B822A51A", "versionEndExcluding": "10.0.0.202\\(c10e3r3p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BD65BBE-8AAA-4B67-A9B6-A58A4DD0CF74", "versionEndExcluding": "10.0.0.194\\(c00e62r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D81385-913B-4A38-A712-41CAE7B78DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECBCD3C2-25B7-431D-8277-E25616008891", "versionEndExcluding": "10.0.0.177\\(c432e3r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A1E3C0-5364-4C4D-BB27-69941AAE68C0", "versionEndExcluding": "10.0.0.202\\(c10e3r3p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E2BCA7E-E555-45D1-807A-F53682B0C383", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25442A0C-4E81-4417-BC5E-8F9CC71E4AED", "versionEndExcluding": "9.1.0.290\\(c431e1r1p8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19E562E7-C11D-4D00-B288-B287EC7BF250", "versionEndExcluding": "9.1.0.290\\(c605e6r1p6\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "671F4E52-9877-40BA-AA8A-377C9DD7431A", "versionEndExcluding": "9.1.0.295\\(c431e5r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2224974-8DCD-410A-A072-2D52B26BB56D", "versionEndExcluding": "9.1.0.291\\(c432e5r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A71A7A6-2220-45F0-B9E0-560632C36EE2", "versionEndExcluding": "9.1.0.291\\(c636e4r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D1A153-274B-40A2-B9A8-F5E8B83258A1", "versionEndExcluding": "9.1.0.297\\(c605e4r4p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "511131DF-79C4-41A5-A0D3-015A832B2C35", "versionEndExcluding": "10.0.0.200\\(c185e3r3p3\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24DC8C7E-C586-4B6C-99A9-808202A7BD55", "versionEndExcluding": "10.0.0.201\\(c10e5r4p3\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" }, { "lang": "es", "value": "En los manejadores de ioctl del controlador Mediatek de Command Queue, hay una posible escritura fuera de l\u00edmites debido a un saneamiento de entrada insuficiente y a una falta de restricciones de SELinux. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: kernel de Android, ID de Android: A-147882143, Referencias: M-ALPS04356754" } ], "id": "CVE-2020-0069", "lastModified": "2024-11-21T04:52:50.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-10T20:15:21.947", "references": [ { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" }, { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2020-03-01" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-0069
Vulnerability from cvelistv5
Published
2020-03-10 19:56
Modified
2024-08-04 05:47
Severity ?
EPSS score ?
Summary
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
References
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2020-03-01 | x_refsource_MISC | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:47:40.759Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Android kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-27T11:06:04", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2020-0069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2020-03-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2020-0069", "datePublished": "2020-03-10T19:56:37", "dateReserved": "2019-10-17T00:00:00", "dateUpdated": "2024-08-04T05:47:40.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9069
Vulnerability from cvelistv5
Published
2020-05-21 14:19
Modified
2024-08-04 10:19
Severity ?
EPSS score ?
Summary
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | HUAWEI | Anne-AL00 |
Version: earlier than 9.1.0.331(C675E9R1P3T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:19.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Anne-AL00", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] }, { "product": "Berkeley-L09", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.1.1(C675R1)" } ] }, { "product": "CD16-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "Columbia-TL00B", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] }, { "product": "E6878-370", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.5.1(H610SP10C00)" } ] }, { "product": "HUAWEI P30 lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.185(C605E3R1P3)" }, { "status": "affected", "version": "earlier than 10.0.0.197(C432E8R2P7)" } ] }, { "product": "HUAWEI nova 4e", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Honor 10 Lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "9.0.1.113(C675E11R1P12)" } ] }, { "product": "LelandP-L22A", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] }, { "product": "Marie-AL00AX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00AY", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-L03BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "Marie-L21BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C432E4R4P1)" }, { "status": "affected", "version": "earlier than 10.0.0.188(C461E5R3P1)" } ] }, { "product": "Marie-L22BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C636E3R3P1)" } ] }, { "product": "Marie-L23BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "TC5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-11", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-12", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-17", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5800-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.3.27" } ] }, { "product": "WS6500-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS6500-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-29T22:23:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Anne-AL00", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] } }, { "product_name": "Berkeley-L09", "version": { "version_data": [ { "version_value": "earlier than 10.0.1.1(C675R1)" } ] } }, { "product_name": "CD16-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "Columbia-TL00B", "version": { "version_data": [ { "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] } }, { "product_name": "E6878-370", "version": { "version_data": [ { "version_value": "earlier than 10.0.5.1(H610SP10C00)" } ] } }, { "product_name": "HUAWEI P30 lite", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.185(C605E3R1P3)" }, { "version_value": "earlier than 10.0.0.197(C432E8R2P7)" } ] } }, { "product_name": "HUAWEI nova 4e", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Honor 10 Lite", "version": { "version_data": [ { "version_value": "9.0.1.113(C675E11R1P12)" } ] } }, { "product_name": "LelandP-L22A", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] } }, { "product_name": "Marie-AL00AX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00AY", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-L03BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "Marie-L21BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C432E4R4P1)" }, { "version_value": "earlier than 10.0.0.188(C461E5R3P1)" } ] } }, { "product_name": "Marie-L22BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C636E3R3P1)" } ] } }, { "product_name": "Marie-L23BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "TC5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-11", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-12", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-17", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5800-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.3.27" } ] } }, { "product_name": "WS6500-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS6500-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } } ] }, "vendor_name": "HUAWEI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9069", "datePublished": "2020-05-21T14:19:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:19.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }