All the vulnerabilites related to huawei - elle-al00b_firmware
Vulnerability from fkie_nvd
Published
2019-11-13 00:15
Modified
2024-11-21 04:44
Severity ?
Summary
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | elle-al00b_firmware | 9.1.0.109\(c00e106r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.113\(c00e110r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.125\(c00e120r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.135\(c00e130r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.153\(c00e150r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.155\(c00e150r1p21\) | |
huawei | elle-al00b_firmware | 9.1.0.162\(c00e160r2p1\) | |
huawei | elle-al00b | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.109\\(c00e106r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F60133F-DFD1-4F05-8A72-2A5174655B5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.113\\(c00e110r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "0A11D57A-E0FA-4171-87E0-840D955B353B", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.125\\(c00e120r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "51633B94-AAC4-44EB-9103-5CA60B04101C", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.135\\(c00e130r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "637B19C5-5BCC-42D8-876E-907FCA1B6026", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.153\\(c00e150r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "895DDB0D-4DE1-48ED-8CEB-B4424EEE579D", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.155\\(c00e150r1p21\\):*:*:*:*:*:*:*", "matchCriteriaId": "A0854055-3874-4113-9094-2FAA9EC6DFA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C3DEAC5-9F49-4967-BCD4-DCF58ACCBC61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE97479-E4F0-4C87-B6EE-EE4AE685DE5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution." }, { "lang": "es", "value": "Tel\u00e9fonos Inteligentes con software de ELLE-AL00B versiones 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1), presentan una vulnerabilidad de comprobaci\u00f3n insuficiente. El sistema no comprueba ciertos par\u00e1metros lo suficiente, un atacante debe conectarse al tel\u00e9fono y alcanzar un privilegio alto para iniciar el ataque. Una explotaci\u00f3n con \u00e9xito podr\u00eda causar una ejecuci\u00f3n de c\u00f3digo malicioso o una DOS." } ], "id": "CVE-2019-5246", "lastModified": "2024-11-21T04:44:35.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-13T00:15:11.653", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-14 00:15
Modified
2024-11-21 04:44
Severity ?
Summary
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:alp-al00b_firmware:8.0.0.153\\(c00\\):*:*:*:*:*:*:*", "matchCriteriaId": "00A30EA6-84A9-4549-8CA5-5E3F833C4A46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:alp-tl00b_firmware:8.0.0.129\\(sp2c01\\):*:*:*:*:*:*:*", "matchCriteriaId": "19236304-3FC9-4377-B03E-5197CEA6A3A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7918CD6-341B-4FCC-BD31-30B8952192C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.129\\(sp2c786\\):*:*:*:*:*:*:*", "matchCriteriaId": "99627A07-1127-4F96-B694-D2F4388BEF7E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:bla-al00b_firmware:8.0.0.153\\(c00\\):*:*:*:*:*:*:*", "matchCriteriaId": "E47AF090-F5FB-46CA-BEBA-7C465083CA72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B11D6D9B-335B-404C-88F3-590DF9E5D878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:bla-tl00b_firmware:8.0.0.129\\(sp2c01\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE5185C7-F99C-471C-9718-CC08FFEA49A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:charlotte-al00a_firmware:8.1.0.176\\(c00\\):*:*:*:*:*:*:*", "matchCriteriaId": "332ABD26-1EC2-40E3-A329-481914DAA717", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:charlotte-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC9EFA36-508E-42A6-83A5-D94273265400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:charlotte-tl00b_firmware:8.1.0.176\\(c01\\):*:*:*:*:*:*:*", "matchCriteriaId": "B57C9502-D755-4431-A097-FD485794B133", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:charlotte-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "31979014-C70F-49E9-A37F-A2A622AE9252", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-al10b_firmware:8.1.0.163\\(c00\\):*:*:*:*:*:*:*", "matchCriteriaId": "80721EA2-C5AE-4BD0-877C-43BB508A462F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F63CA2F-45B8-4DD3-81AE-8359929AE50B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-al10i_firmware:8.1.0.150\\(c675custc675d2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0119A5C2-D99B-43BE-A541-F067044866FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFF16336-9CFE-4D67-852B-4C356E3C5951", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.146\\(c461\\):*:*:*:*:*:*:*", "matchCriteriaId": "EAB4D5D8-F919-403D-9209-63C06FD21923", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.148\\(c185\\):*:*:*:*:*:*:*", "matchCriteriaId": "920A33BF-DFDB-40A1-B893-3815C77A3751", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\\(c10\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF676A0A-0446-431B-81B3-E14149E1D764", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:8.1.0.151\\(c432\\):*:*:*:*:*:*:*", "matchCriteriaId": "004FB686-8DE9-4C7A-BEBE-F37043F50A67", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00d_firmware:8.1.0.186\\(c01gt\\):*:*:*:*:*:*:*", "matchCriteriaId": "7A6BCE3A-F806-48FE-8F22-FB77EA671584", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE1BB06-0403-4F46-AF76-DAD85D538907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C3DEAC5-9F49-4967-BCD4-DCF58ACCBC61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE97479-E4F0-4C87-B6EE-EE4AE685DE5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:elle-tl00b_firmware:9.1.0.162\\(c01e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "20316EA5-6D3C-4AC9-BBBB-621E12B4A437", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:elle-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "678B1753-1005-489F-B30A-76C49803FA5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:emily-al00a_firmware:8.1.0.190\\(c00\\):*:*:*:*:*:*:*", "matchCriteriaId": "4080BCCB-AE47-42D1-9570-989A20A2B0F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:emily-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC84A74-7F01-4434-896C-B9B595984F23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:emily-tl00b_firmware:8.1.0.175\\(c01\\):*:*:*:*:*:*:*", "matchCriteriaId": "2648D7A0-CE4D-4EAB-B571-407F46564D9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:emily-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "010C3645-3C82-47F0-908C-9B4CFFC503CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ever-al00b_firmware:9.0.0.195\\(c00e195r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "66AEE44E-3E9A-45B5-9CB9-B9F0CDB4BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ever-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "264C7F11-D6CC-4DF7-8607-736179618A50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.206\\(c185e3r3p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB598092-85FC-4E96-A870-ACC2EF592D2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.207\\(c636e3r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD1835B9-E25A-41DB-BB2C-9DD3603D4025", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:ever-l29b_firmware:9.0.0.208\\(c432e3r1p12\\):*:*:*:*:*:*:*", "matchCriteriaId": "33553334-B4C0-42D0-8185-FD4337F54011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEB4EC14-14DE-4AAF-A951-071B4E39270A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:harry-al00c_firmware:9.1.0.206\\(c00e205r3p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "57CD42F9-7611-452E-AD1C-E14493A02A70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF9FAC4-0A8C-463C-8E5C-64E33D145E52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C41532B6-FE2A-4174-B1AA-074F08B64DEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:harry-al10b_firmware:9.1.0.206\\(c00e205r3p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5395F144-E845-4AB2-A8AC-7A43BE3912A5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A2BE361-1412-455E-A553-0CA9D14E4C1B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:harry-tl00c_firmware:9.0.1.162\\(c01e160r2p3\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE8ADA57-076D-49BE-A354-25B95F1A676C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31013C1-26DA-4A6D-BBD4-BF0630EEEB66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:hima-al00b_firmware:9.0.0.200\\(c00e200r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5DEC5474-D927-456A-8F9D-C854BDB7F968", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:hima-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C0592A2-8087-4847-8586-04ED842960D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jackman-l21_firmware:8.2.0.160\\(c185\\):*:*:*:*:*:*:*", "matchCriteriaId": "39F76953-3CB3-4CCF-A3A3-15267E9A49DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jackman-l21:-:*:*:*:*:*:*:*", "matchCriteriaId": "15F105E1-6077-4FF3-8AD2-472A5DB68CA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jackman-l22_firmware:8.2.0.156\\(c636r2p2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3CEC1CAE-7461-4A57-B31D-98C16167B2B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jackman-l22:-:*:*:*:*:*:*:*", "matchCriteriaId": "B99E236E-D36C-4FE9-93C2-10D01A3A7390", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.152\\(c45custc45d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "41A59832-A342-449F-B4DC-4D4305F62ECF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:jackman-l23_firmware:8.2.0.162\\(c605\\):*:*:*:*:*:*:*", "matchCriteriaId": "9085E680-5AD9-42C6-8DAF-EDEC1E64AC75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jackman-l23:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAB9A357-16B3-4CEE-B235-5B1E951D6719", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-al00ic_firmware:8.2.0.161\\(c675custc675d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5D822874-5669-40AA-8113-7BEF544F80D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-al00ic:-:*:*:*:*:*:*:*", "matchCriteriaId": "8844A56E-E1F2-4CD1-8E81-A4365CF10E41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-al10c_firmware:8.2.0.165\\(c00r1p16\\):*:*:*:*:*:*:*", "matchCriteriaId": "27F82E49-446A-4E37-B340-11A8BEA77EC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-al10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "478E7A4C-C1EC-4D13-B06A-CA8E57C2690B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.130\\(c461r1p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "496C59DA-9104-4C6C-BBB6-6E522D98CF81", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.131\\(c10r2p2\\):*:*:*:*:*:*:*", "matchCriteriaId": "24B9D430-FB96-45A3-A928-F7A7BCE4AFA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l21c_firmware:8.2.0.136\\(c432custc432d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B55EFA94-43FA-442D-9D75-189BFC2368BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l21c:-:*:*:*:*:*:*:*", "matchCriteriaId": "067613ED-432F-457D-929E-238462AC53AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\\(c10custc10d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "59A49059-37AB-448A-A5E4-592120B6F0DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.101\\(c432custc432d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B554E747-6A9A-4EDC-A743-72891D34B4E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l21d_firmware:8.2.0.131\\(c55custc55d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC9F79F8-8042-429B-9329-91B631E6FD40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l21d:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFDAF471-1498-4856-9ECD-8FB3F809D01E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.105\\(c185r1p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3800398A-9704-4380-A329-D4911D73AB5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l22c_firmware:8.2.0.107\\(c636r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BA8F1D00-5BBF-43AD-8C92-D6FF6E5B2819", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l22c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC60D552-5519-4020-9C45-E2EBC3700693", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.105\\(c185r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1455033B-FF7E-44B4-8ECF-250D961D4B49", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l22d_firmware:8.2.0.107\\(c636r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "636275C8-D825-4C66-BEFB-BB91BA8EB38D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l22d:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB32655-E8FE-4058-B31C-052E609746C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.130\\(c636custc636d2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0309BA64-78C5-4790-84AC-AE38F9080F91", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-l23c_firmware:8.2.0.133\\(c605custc605d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0DC6487-720E-4722-A864-1FB7B5FB351C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l23c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EF62125-1E21-47BE-835A-61243E3F690F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l42ic_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A014F6CA-21F5-40C1-A2B0-DBE4FBC262D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l42ic:-:*:*:*:*:*:*:*", "matchCriteriaId": "F72F9B44-B835-4A93-A2D0-1B1FF8FEA81F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l42ie_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1446494D-014E-4F07-AE60-F89C7EA56C0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l42ie:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C91EE9E-C333-4D02-9184-29631948D0FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-l42if_firmware:8.2.0.155\\(c675r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "28656199-3BC2-4847-9468-D323DB37199E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-l42if:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EFE0746-31FB-4151-8D70-AAE0611CCDFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.100\\(c541custc541d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "07548F3F-D36D-457B-9899-92BCBEF91B5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:huawei:johnson-tl00d_firmware:8.2.0.165\\(c01r1p16\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B4713A6-FF22-40C7-896E-C0D626AF6D2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "566629E0-84F2-4DFA-A20E-2D20C472E4B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-tl00f_firmware:8.2.0.100\\(c541custc541d1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3563E6B0-881E-4854-99F5-196C7A7AA595", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*", "matchCriteriaId": "0075F84C-492C-408D-941B-274A0A0C3B82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:laya-al00ep_firmware:9.0.0.201\\(c786e200r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "68BB4A88-06F2-46E5-B03A-A4450CA7CE40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3A54AE-DC30-429B-8FB8-BE6EB933E685", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:neo-al00d_firmware:8.1.0.175\\(c786\\):*:*:*:*:*:*:*", "matchCriteriaId": "581A0F86-A651-48E7-930A-3BD773C1AF0E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4B07FEC-514D-4A51-B26B-02254A867DC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:potter-al00c_firmware:9.1.0.208\\(c00e205r3p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "17A2F928-6CF8-408B-B3F4-CED7441B8307", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*", "matchCriteriaId": "34141B01-DA8B-4029-B275-395AC11C40C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:potter-al10a_firmware:9.1.0.208\\(c00e205r3p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AEAE9002-378D-4466-AB62-A190C34AD61F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CF01A3C-2E60-45B8-8D4E-58B5710FC40C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10b_firmware:9.1.0.211\\(c00e203r2p2\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE3A7EB6-8CC6-40CB-93B0-129E7E7A2483", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10d_firmware:9.1.0.212\\(c00e204r2p2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A5EC9D33-A11F-4F8F-BE37-9B8C4263EF95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E6B825-CA55-4BEC-8279-3F33F7CC93EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10i_firmware:9.0.1.150\\(c675e9r1p4\\):*:*:*:*:*:*:*", "matchCriteriaId": "10A41D90-90FC-41C2-A5A3-B1A5CF7FB54D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5E9766B-FFB3-47F0-9C55-57F1C268109C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-tl10c_firmware:9.1.0.211\\(c01e203r2p2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF0B7171-505A-4A24-8861-2533F9F10011", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F6A54F-E004-4BE7-A6A6-3E7C300DC498", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-al00b_firmware:9.1.0.206\\(c00e200r2p3\\):*:*:*:*:*:*:*", "matchCriteriaId": "4961A11C-A7A7-4AA1-BC36-F0D9FECC37B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-tl00b_firmware:9.1.0.206\\(c01e200r2p3\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD232463-90AA-42BF-A569-F5BE483F27E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:vogue-al00a_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7B24E79-5313-4151-B2F3-11A411AF25C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:vogue-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "973B0865-F7A6-4851-BEBE-6026E54CC04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:vogue-al00a-preload_firmware:9.1.0.12\\(c00r1\\):*:*:*:*:*:*:*", "matchCriteriaId": "62F817EB-12AA-472D-8607-299352831E71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:vogue-al00a-preload:-:*:*:*:*:*:*:*", "matchCriteriaId": "373003A1-4308-45DD-8A8D-607CEE7BBBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:vogue-al10c_firmware:9.1.0.162\\(c00e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EADD0609-5B61-4605-B015-B0BF67E1D037", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:vogue-al10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD081515-6391-40B5-BAE5-162DFE3E2C30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:vogue-al10c-preload_firmware:9.1.0.12\\(c00r1\\):*:*:*:*:*:*:*", "matchCriteriaId": "CC4DDD74-425B-4BA0-A64E-3E2300518EBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:vogue-al10c-preload:-:*:*:*:*:*:*:*", "matchCriteriaId": "71FCE443-E810-4011-AE70-117F37A18CFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:vogue-tl00b_firmware:9.1.0.162\\(c01e160r2p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "865A13F6-B4F0-432D-8328-05E9D10A0FF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:vogue-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "264C6E15-84C8-40D3-895D-15736062439F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal." }, { "lang": "es", "value": "Algunos tel\u00e9fonos inteligentes Huawei tienen una vulnerabilidad de desreferencia del puntero null. Un atacante crea paquetes espec\u00edficos y los env\u00eda al producto afectado para explotar esta vulnerabilidad. La explotaci\u00f3n con \u00e9xito puede causar que el tel\u00e9fono afectado sea anormal." } ], "id": "CVE-2019-5235", "lastModified": "2024-11-21T04:44:34.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-14T00:15:10.977", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-23 18:15
Modified
2024-11-21 04:44
Severity ?
Summary
Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | elle-al00b_firmware | * | |
huawei | elle-al00b | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:elle-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC2CE80A-A192-44EB-A83C-403DA7BDFA13", "versionEndExcluding": "9.1.0.222\\(c00e220r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:elle-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FE97479-E4F0-4C87-B6EE-EE4AE685DE5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal." }, { "lang": "es", "value": "Los tel\u00e9fonos inteligentes Huawei con versiones anteriores a ELLE-AL00B 9.1.0.222(C00E220R2P1), presentan una vulnerabilidad de desbordamiento de b\u00fafer. Un atacante puede interceptar y manipular el paquete en la red de \u00e1rea local (LAN) para explotar esta vulnerabilidad. Una explotaci\u00f3n con \u00e9xito puede causar que el tel\u00e9fono afectado sea anormal." } ], "id": "CVE-2019-5276", "lastModified": "2024-11-21T04:44:39.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-23T18:15:11.083", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-5235
Vulnerability from cvelistv5
Published
2019-12-13 23:09
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B |
Version: Version Version: 9.1.0.206(C00E205R3P1) Version: 9.0.1.5(C735R1) Version: 9.1.0.1(C00R3) Version: 9.1.0.206 Version: 9.0.1.162(C01E160R2P3) Version: 8.2.0.170(C861) Version: 8.2.0.188(C00R2P1) Version: 8.2.0.163(C605) Version: 8.2.0.160(C185) Version: 8.2.0.156(C636R2P2) Version: 8.2.0.152(C45CUSTC45D1) Version: 8.2.0.162(C605) Version: 8.2.0.175(C00R2P4) Version: 8.2.0.190(C788R1P16) Version: 8.2.0.161(C675CUSTC675D1) Version: 8.2.0.165(C00R1P16) Version: 8.2.0.130(C461R1P1) Version: 8.2.0.130(C652CUSTC652D1) Version: 8.2.0.131(C10R2P2) Version: 8.2.0.136(C432CUSTC432D1) Version: 8.2.0.101(C10CUSTC10D1) Version: 8.2.0.101(C432CUSTC432D1) Version: 8.2.0.131(C55CUSTC55D1) Version: 8.2.0.105(C185R1P1) Version: 8.2.0.107(C636R2P1) Version: 8.2.0.103(C652CUSTC652D1) Version: 8.2.0.105(C185R2P1) Version: 8.2.0.130(C636CUSTC636D2) Version: 8.2.0.133(C605CUSTC605D1) Version: 8.2.0.155(C675R2P1) Version: 8.2.0.110(C652CUSTC652D1) Version: 8.2.0.100(C541CUSTC541D1) Version: 8.2.0.165(C01R1P16) Version: 9.1.0.208(C00E205R3P1) Version: 9.1.0.162(C00E160R2P1) Version: 9.1.0.12(C00R1) Version: 9.1.0.4(C735R1) Version: 9.1.0.162 Version: 9.1.0.161 Version: 9.1.0.162(C01E160R2P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.874Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Version" }, { "status": "affected", "version": "9.1.0.206(C00E205R3P1)" }, { "status": "affected", "version": "9.0.1.5(C735R1)" }, { "status": "affected", "version": "9.1.0.1(C00R3)" }, { "status": "affected", "version": "9.1.0.206" }, { "status": "affected", "version": "9.0.1.162(C01E160R2P3)" }, { "status": "affected", "version": "8.2.0.170(C861)" }, { "status": "affected", "version": "8.2.0.188(C00R2P1)" }, { "status": "affected", "version": "8.2.0.163(C605)" }, { "status": "affected", "version": "8.2.0.160(C185)" }, { "status": "affected", "version": "8.2.0.156(C636R2P2)" }, { "status": "affected", "version": "8.2.0.152(C45CUSTC45D1)" }, { "status": "affected", "version": "8.2.0.162(C605)" }, { "status": "affected", "version": "8.2.0.175(C00R2P4)" }, { "status": "affected", "version": "8.2.0.190(C788R1P16)" }, { "status": "affected", "version": "8.2.0.161(C675CUSTC675D1)" }, { "status": "affected", "version": "8.2.0.165(C00R1P16)" }, { "status": "affected", "version": "8.2.0.130(C461R1P1)" }, { "status": "affected", "version": "8.2.0.130(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.131(C10R2P2)" }, { "status": "affected", "version": "8.2.0.136(C432CUSTC432D1)" }, { "status": "affected", "version": "8.2.0.101(C10CUSTC10D1)" }, { "status": "affected", "version": "8.2.0.101(C432CUSTC432D1)" }, { "status": "affected", "version": "8.2.0.131(C55CUSTC55D1)" }, { "status": "affected", "version": "8.2.0.105(C185R1P1)" }, { "status": "affected", "version": "8.2.0.107(C636R2P1)" }, { "status": "affected", "version": "8.2.0.103(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.105(C185R2P1)" }, { "status": "affected", "version": "8.2.0.130(C636CUSTC636D2)" }, { "status": "affected", "version": "8.2.0.133(C605CUSTC605D1)" }, { "status": "affected", "version": "8.2.0.155(C675R2P1)" }, { "status": "affected", "version": "8.2.0.110(C652CUSTC652D1)" }, { "status": "affected", "version": "8.2.0.100(C541CUSTC541D1)" }, { "status": "affected", "version": "8.2.0.165(C01R1P16)" }, { "status": "affected", "version": "9.1.0.208(C00E205R3P1)" }, { "status": "affected", "version": "9.1.0.162(C00E160R2P1)" }, { "status": "affected", "version": "9.1.0.12(C00R1)" }, { "status": "affected", "version": "9.1.0.4(C735R1)" }, { "status": "affected", "version": "9.1.0.162" }, { "status": "affected", "version": "9.1.0.161" }, { "status": "affected", "version": "9.1.0.162(C01E160R2P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T23:09:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Harry-AL00C, Harry-AL00C-PRELOAD, Harry-AL10B, Harry-LGRP1-CHN, Harry-TL00C, Jackman-AL00D, Jackman-L03, Jackman-L21, Jackman-L22, Jackman-L23, Johnson-AL00C, Johnson-AL00IC, Johnson-AL10C, Johnson-L21C, Johnson-L21D, Johnson-L22C, Johnson-L22D, Johnson-L23C, Johnson-L42IC, Johnson-L42IE, Johnson-L42IF, Johnson-TL00D, Johnson-TL00F, Potter-AL00C, Potter-AL10A, VOGUE-AL00A, VOGUE-AL00A-PRELOAD, VOGUE-AL10C, VOGUE-AL10C-PRELOAD, VOGUE-LGRP1-CHN, VOGUE-LGRP2-OVS, VOGUE-TL00B", "version": { "version_data": [ { "version_value": "Version" }, { "version_value": "9.1.0.206(C00E205R3P1)" }, { "version_value": "9.0.1.5(C735R1)" }, { "version_value": "9.1.0.1(C00R3)" }, { "version_value": "9.1.0.206(C00E205R3P1)" }, { "version_value": "9.1.0.206" }, { "version_value": "9.0.1.162(C01E160R2P3)" }, { "version_value": "8.2.0.170(C861)" }, { "version_value": "8.2.0.188(C00R2P1)" }, { "version_value": "8.2.0.163(C605)" }, { "version_value": "8.2.0.160(C185)" }, { "version_value": "8.2.0.156(C636R2P2)" }, { "version_value": "8.2.0.152(C45CUSTC45D1)" }, { "version_value": "8.2.0.162(C605)" }, { "version_value": "8.2.0.175(C00R2P4)" }, { "version_value": "8.2.0.190(C788R1P16)" }, { "version_value": "8.2.0.161(C675CUSTC675D1)" }, { "version_value": "8.2.0.165(C00R1P16)" }, { "version_value": "8.2.0.130(C461R1P1)" }, { "version_value": "8.2.0.130(C652CUSTC652D1)" }, { "version_value": "8.2.0.131(C10R2P2)" }, { "version_value": "8.2.0.136(C432CUSTC432D1)" }, { "version_value": "8.2.0.101(C10CUSTC10D1)" }, { "version_value": "8.2.0.101(C432CUSTC432D1)" }, { "version_value": "8.2.0.131(C55CUSTC55D1)" }, { "version_value": "8.2.0.105(C185R1P1)" }, { "version_value": "8.2.0.107(C636R2P1)" }, { "version_value": "8.2.0.103(C652CUSTC652D1)" }, { "version_value": "8.2.0.105(C185R2P1)" }, { "version_value": "8.2.0.107(C636R2P1)" }, { "version_value": "8.2.0.130(C636CUSTC636D2)" }, { "version_value": "8.2.0.133(C605CUSTC605D1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.110(C652CUSTC652D1)" }, { "version_value": "8.2.0.155(C675R2P1)" }, { "version_value": "8.2.0.100(C541CUSTC541D1)" }, { "version_value": "8.2.0.165(C01R1P16)" }, { "version_value": "8.2.0.100(C541CUSTC541D1)" }, { "version_value": "9.1.0.208(C00E205R3P1)" }, { "version_value": "9.1.0.208(C00E205R3P1)" }, { "version_value": "9.1.0.162(C00E160R2P1)" }, { "version_value": "9.1.0.12(C00R1)" }, { "version_value": "9.1.0.4(C735R1)" }, { "version_value": "9.1.0.162(C00E160R2P1)" }, { "version_value": "9.1.0.12(C00R1)" }, { "version_value": "9.1.0.162" }, { "version_value": "9.1.0.161" }, { "version_value": "9.1.0.162(C01E160R2P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190821-01-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5235", "datePublished": "2019-12-13T23:09:32", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.874Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5276
Vulnerability from cvelistv5
Published
2019-12-23 17:54
Modified
2024-08-04 19:54
Severity ?
EPSS score ?
Summary
Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei | ELLE-AL00B |
Version: earlier versions than 9.1.0.222(C00E220R2P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:54:51.772Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ELLE-AL00B", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "earlier versions than 9.1.0.222(C00E220R2P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-23T17:54:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ELLE-AL00B", "version": { "version_data": [ { "version_value": "earlier versions than 9.1.0.222(C00E220R2P1)" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191218-02-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5276", "datePublished": "2019-12-23T17:54:21", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:54:51.772Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5246
Vulnerability from cvelistv5
Published
2019-11-12 23:14
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | ELLE-AL00B |
Version: 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.917Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ELLE-AL00B", "vendor": "n/a", "versions": [ { "status": "affected", "version": "9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient Verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-12T23:14:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5246", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ELLE-AL00B", "version": { "version_data": [ { "version_value": "9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain parameters sufficiently, an attacker should connect to the phone and gain high privilege to launch the attack. Successful exploit could cause DOS or malicious code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient Verification" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en", "refsource": "MISC", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-01-codeexecution-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5246", "datePublished": "2019-11-12T23:14:53", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.917Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }