Search criteria
2 vulnerabilities found for honor6 by huawei
VAR-201609-0050
Vulnerability from variot - Updated: 2023-12-18 13:19The WiFi driver in Huawei Honor 6 smartphones with software H60-L01 before H60-L01C00B850, H60-L11 before H60-L11C00B850, H60-L21 before H60-L21C00B850, H60-L02 before H60-L02C00B850, H60-L12 before H60-L12C00B850, and H60-L03 before H60-L03C01B850 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiHonor6 is a smartphone product. Huawei Honor6 Smart Phone is prone to a local privilege-escalation vulnerability. An input validation vulnerability exists in the WiFi driver in Huawei Honor6. The following versions are affected: Huawei Honor6 before H60-L01C00B850, before H60-L11C00B850, before H60-L21C00B850, before H60-L02C00B850, before H60-L12C00B850, before H60-L03C01B850
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0050",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l02c00b850"
},
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l03c01b850"
},
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l21c00b850"
},
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l11c00b850"
},
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l01c00b850"
},
{
"model": "honor 6",
"scope": "eq",
"trust": 1.4,
"vendor": "huawei",
"version": "h60-l12c00b850"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l11c00b850"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l11"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l01c00b850"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l12"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l21"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l03"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l01"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l12c00b850"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l02c00b850"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l03c01b850"
},
{
"model": "honor 6",
"scope": "gte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l02"
},
{
"model": "honor 6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "h60-l21c00b850"
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l21"
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l03"
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l01"
},
{
"model": "honor 6",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l12"
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l02"
},
{
"model": "honor 6",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "h60-l11"
},
{
"model": "honor6 \u003ch60-l01c00b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 \u003ch60-l11c00b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 \u003ch60-l21c00b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 \u003ch60-l02c00b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 \u003ch60-l12c00b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 \u003ch60-l03c01b850",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "honor6",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "honor6 h60-l21c00b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l12c00b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l11c00b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l03c01b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l02c00b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l01c00b850",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "BID",
"id": "91773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l11c00b850",
"versionStartIncluding": "h60-l11",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l21c00b850",
"versionStartIncluding": "h60-l21",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l01c00b850",
"versionStartIncluding": "h60-l01",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l02c00b850",
"versionStartIncluding": "h60-l02",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l03c01b850",
"versionStartIncluding": "h60-l03",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "h60-l12c00b850",
"versionStartIncluding": "h60-l12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6179"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Xiao Peng and Song Yang of Alibaba Mobile Security Team.,Yang Chengming, Yang Chao, You Ning",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
],
"trust": 0.6
},
"cve": "CVE-2016-6179",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 6.9,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2016-6179",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-05049",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.4,
"id": "VHN-94999",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-6179",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-6179",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2016-05049",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201607-414",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-94999",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "VULHUB",
"id": "VHN-94999"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The WiFi driver in Huawei Honor 6 smartphones with software H60-L01 before H60-L01C00B850, H60-L11 before H60-L11C00B850, H60-L21 before H60-L21C00B850, H60-L02 before H60-L02C00B850, H60-L12 before H60-L12C00B850, and H60-L03 before H60-L03C01B850 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( System crash ) It may be put into a state or it may be authorized. HuaweiHonor6 is a smartphone product. Huawei Honor6 Smart Phone is prone to a local privilege-escalation vulnerability. An input validation vulnerability exists in the WiFi driver in Huawei Honor6. The following versions are affected: Huawei Honor6 before H60-L01C00B850, before H60-L11C00B850, before H60-L21C00B850, before H60-L02C00B850, before H60-L12C00B850, before H60-L03C01B850",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "BID",
"id": "91773"
},
{
"db": "VULHUB",
"id": "VHN-94999"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-6179",
"trust": 3.4
},
{
"db": "BID",
"id": "91773",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-05049",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-94999",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "VULHUB",
"id": "VHN-94999"
},
{
"db": "BID",
"id": "91773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"id": "VAR-201609-0050",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "VULHUB",
"id": "VHN-94999"
}
],
"trust": 1.294720175
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
}
]
},
"last_update_date": "2023-12-18T13:19:40.309000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160713-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-smartphone-en"
},
{
"title": "HuaweiHonor6SmartPhone local privilege escalation patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/79350"
},
{
"title": "Huawei Honor6 Smart Phone Remedial measures for local privilege escalation",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=62959"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-94999"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/91773"
},
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160713-01-smartphone-en"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6179"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6179"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "VULHUB",
"id": "VHN-94999"
},
{
"db": "BID",
"id": "91773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"db": "VULHUB",
"id": "VHN-94999"
},
{
"db": "BID",
"id": "91773"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"date": "2016-09-07T00:00:00",
"db": "VULHUB",
"id": "VHN-94999"
},
{
"date": "2016-07-13T00:00:00",
"db": "BID",
"id": "91773"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"date": "2016-09-07T20:59:02.920000",
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"date": "2016-07-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-07-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-05049"
},
{
"date": "2019-05-30T00:00:00",
"db": "VULHUB",
"id": "VHN-94999"
},
{
"date": "2016-07-13T00:00:00",
"db": "BID",
"id": "91773"
},
{
"date": "2016-09-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-004563"
},
{
"date": "2019-05-30T14:31:22.080000",
"db": "NVD",
"id": "CVE-2016-6179"
},
{
"date": "2019-05-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "91773"
},
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Huawei Honor6 Smartphone software WiFi Service disruption in drivers (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-004563"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201607-414"
}
],
"trust": 0.6
}
}
VAR-201609-0181
Vulnerability from variot - Updated: 2023-12-18 12:57The video driver in Huawei Mate S smartphones with software CRR-TL00 before CRR-TL00C01B362, CRR-UL20 before CRR-UL20C00B362, CRR-CL00 before CRR-CL00C92B362, and CRR-CL20 before CRR-CL20C92B362; P8 smartphones with software GRA-TL00 before GRA-TL00C01B366, GRA-UL00 before GRA-UL00C00B366, GRA-UL10 before GRA-UL10C00B366, and GRA-CL00 before GRA-CL00C92B366; and Honor 6 and Honor 6 Plus smartphones with software before 6.9.16 allows attackers to cause a denial of service (device reboot) via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( Reboot device ) There is a possibility of being put into a state. HuaweiMateS is a smartphone product of China Huawei. Video drivers in various Huawei smartphones have security vulnerabilities that allow remote attackers to exploit vulnerabilities to pass specific parameters to mobile phones through malicious applications for denial of service attacks. Huawei Smart Phone is prone to a local denial-of-service vulnerability. A local attacker can exploit this issue to cause a denial-of-service condition. The following products are vulnerable: Versions of Mate S and P8 before CRR-TL00C01B362 are affected. Versions of Hono6 and Honor6 Plus prior to 6.9.16 are affected
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201609-0181",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-cl20"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-ul10"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-ul20"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-tl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-cl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-ul00"
},
{
"model": "p8",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "gra-tl00"
},
{
"model": "mate s",
"scope": "eq",
"trust": 1.6,
"vendor": "huawei",
"version": "crr-cl00"
},
{
"model": "honor6",
"scope": "lte",
"trust": 1.0,
"vendor": "huawei",
"version": "6.9"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-tl00c01b362"
},
{
"model": "honor 6 plus",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-cl00"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl20"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-cl00c92b366"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl00"
},
{
"model": "honor 6",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-tl00"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl20c92b362"
},
{
"model": "mate s",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul00"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-tl00"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul00c00b366"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-tl00c01b366"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-ul20c00b362"
},
{
"model": "mate s",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-cl00c92b362"
},
{
"model": "p8",
"scope": null,
"trust": 0.8,
"vendor": "huawei",
"version": null
},
{
"model": "p8",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul10"
},
{
"model": "mate s",
"scope": "lt",
"trust": 0.8,
"vendor": "huawei",
"version": "crr-ul20"
},
{
"model": "p8",
"scope": "eq",
"trust": 0.8,
"vendor": "huawei",
"version": "gra-ul10c00b366"
},
{
"model": "mate s \u003ccrr-tl00c01b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-ul20c00b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-cl00c92b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "mate s \u003ccrr-cl20c92b362",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-tl00c01b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-ul00c00b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-ul10c00b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "p8 \u003cgra-cl00c92b366",
"scope": null,
"trust": 0.6,
"vendor": "huawei",
"version": null
},
{
"model": "glory",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6\u003c6.9.16"
},
{
"model": "glory plus",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6\u003c6.9.16"
},
{
"model": "honor6",
"scope": "eq",
"trust": 0.6,
"vendor": "huawei",
"version": "6.9"
},
{
"model": "p8 gra-ul10c00b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul10c00b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-ul00c00b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b220sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-tl00c01b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl10c92b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b363",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b350",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b230",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b220",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 gra-cl00c92b182",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-ul00c00b160",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-ul00c00b153",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b160sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b153sp01",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-cl00c92b161",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-cl00c92b153",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 plus",
"scope": "eq",
"trust": 0.3,
"vendor": "huawei",
"version": "0"
},
{
"model": "honor6 h60-l21c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l12c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l11c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l03c01b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l02c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 h60-l01c00b850",
"scope": null,
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "p8 crr-tl00c01b362",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "mate s crr-tl00c01b362",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": null
},
{
"model": "honor6 plus",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "6.9.16"
},
{
"model": "honor6",
"scope": "ne",
"trust": 0.3,
"vendor": "huawei",
"version": "6.9.16"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-cl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-ul00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-cl20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-cl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-ul20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:huawei:mate_s_firmware:crr-tl00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:huawei:honor6_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.9",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:huawei:honor6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:huawei:honor6_plus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8279"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Wang Qize, Zhu Bin of VPP Security Team and PanYu of 360 Vulpecker Team.",
"sources": [
{
"db": "BID",
"id": "93096"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.9
},
"cve": "CVE-2016-8279",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.1,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8279",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.9,
"id": "CNVD-2016-08186",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-97099",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 5.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2016-8279",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2016-8279",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2016-08186",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201609-500",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-97099",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The video driver in Huawei Mate S smartphones with software CRR-TL00 before CRR-TL00C01B362, CRR-UL20 before CRR-UL20C00B362, CRR-CL00 before CRR-CL00C92B362, and CRR-CL20 before CRR-CL20C92B362; P8 smartphones with software GRA-TL00 before GRA-TL00C01B366, GRA-UL00 before GRA-UL00C00B366, GRA-UL10 before GRA-UL10C00B366, and GRA-CL00 before GRA-CL00C92B366; and Honor 6 and Honor 6 Plus smartphones with software before 6.9.16 allows attackers to cause a denial of service (device reboot) via a crafted application. Supplementary information : CWE Vulnerability type by CWE-284: Improper Access Control ( Inappropriate access control ) Has been identified. http://cwe.mitre.org/data/definitions/284.htmlDenial of service operations through a specially crafted application by an attacker ( Reboot device ) There is a possibility of being put into a state. HuaweiMateS is a smartphone product of China Huawei. Video drivers in various Huawei smartphones have security vulnerabilities that allow remote attackers to exploit vulnerabilities to pass specific parameters to mobile phones through malicious applications for denial of service attacks. Huawei Smart Phone is prone to a local denial-of-service vulnerability. \nA local attacker can exploit this issue to cause a denial-of-service condition. \nThe following products are vulnerable:\nVersions of Mate S and P8 before CRR-TL00C01B362 are affected. \nVersions of Hono6 and Honor6 Plus prior to 6.9.16 are affected",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "VULHUB",
"id": "VHN-97099"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8279",
"trust": 3.4
},
{
"db": "BID",
"id": "93096",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-08186",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-97099",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"id": "VAR-201609-0181",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
}
],
"trust": 1.367450498
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
}
]
},
"last_update_date": "2023-12-18T12:57:36.398000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "huawei-sa-20160921-01-smartphone",
"trust": 0.8,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160921-01-smartphone-en"
},
{
"title": "Patches for multiple Huawei smartphone denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/81804"
},
{
"title": "Multiple Huawei Fixes for smartphone video driver denial of service vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=64237"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-284",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160921-01-smartphone-en"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/93096"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8279"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8279"
},
{
"trust": 0.6,
"url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20160921-01-smartphone-cn"
},
{
"trust": 0.3,
"url": "http://www.huawei.com"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"db": "VULHUB",
"id": "VHN-97099"
},
{
"db": "BID",
"id": "93096"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"date": "2016-09-26T00:00:00",
"db": "VULHUB",
"id": "VHN-97099"
},
{
"date": "2016-09-21T00:00:00",
"db": "BID",
"id": "93096"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"date": "2016-09-26T14:59:09.680000",
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"date": "2016-09-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-09-27T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-08186"
},
{
"date": "2016-12-02T00:00:00",
"db": "VULHUB",
"id": "VHN-97099"
},
{
"date": "2016-09-23T00:00:00",
"db": "BID",
"id": "93096"
},
{
"date": "2016-10-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005046"
},
{
"date": "2016-12-02T23:37:26.757000",
"db": "NVD",
"id": "CVE-2016-8279"
},
{
"date": "2016-09-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Huawei Service disruption in video drivers for smartphone software (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005046"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201609-500"
}
],
"trust": 0.6
}
}