All the vulnerabilites related to huawei - honor_9i
Vulnerability from fkie_nvd
Published
2019-12-13 15:15
Modified
2024-11-21 04:44
Severity ?
Summary
There is a path traversal vulnerability in several Huawei smartphones. The system does not sufficiently validate certain pathnames from the application. An attacker could trick the user into installing, backing up and restoring a malicious application. Successful exploit could cause information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | honor_v10_firmware | * | |
huawei | honor_v10 | - | |
huawei | p30_firmware | * | |
huawei | p30 | - | |
huawei | enjoy_7s_firmware | * | |
huawei | enjoy_7s | - | |
huawei | mate_20_firmware | * | |
huawei | mate_20 | - | |
huawei | honor_9_lite_firmware | * | |
huawei | honor_9_lite | - | |
huawei | honor_9i_firmware | * | |
huawei | honor_9i | - | |
huawei | m6_firmware | * | |
huawei | m6 | - | |
huawei | p30_pro_firmware | * | |
huawei | p30_pro | - | |
huawei | honor_20s_firmware | * | |
huawei | honor_20s | - | |
huawei | honor_9_lite_firmware | * | |
huawei | honor_9_lite | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B394D790-9589-4FC3-8B51-47B9F6E241D2", "versionEndExcluding": "9.1.0.333\\(c00e333r2p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*", "matchCriteriaId": "592CF37A-83FA-4C85-B5E7-1DB2297A77A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76BF8190-0F8E-4BEF-81C6-FE409F6B812A", "versionEndExcluding": "9.1.0.226\\(c00e220r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EE286C-8111-4F59-8CF1-13C68EA76B21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:enjoy_7s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29CD79B3-14E0-44A4-B9DE-4C4A47449626", "versionEndExcluding": "9.1.0.130\\(c00e115r2p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:enjoy_7s:-:*:*:*:*:*:*:*", "matchCriteriaId": "40688207-579D-444D-A594-54E65069B6A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9BE6DA3-8840-4B23-8F78-632112A2B039", "versionEndExcluding": "9.1.0.139\\(c00e133r3p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5322963-9375-4E4E-8119-895C224003AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6154A71C-59D9-47C0-B7CA-AC837CB70E32", "versionEndExcluding": "9.1.0.143\\(c636e5r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5DA66B4F-B5D6-485B-A741-1D08C03957E0", "versionEndExcluding": "9.1.0.120\\(c00e113r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FC9664F-3422-4630-B917-326BDC4AF0BE", "versionEndExcluding": "9.1.1.150\\(c00e150r1p150\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "996B603A-E8F8-408D-A204-BB0638498F9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B40B07F3-0A6C-4102-976F-2E787311AA12", "versionEndExcluding": "9.1.0.226\\(c00e210r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB671DB-CB5B-46E0-B221-722D051184DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_20s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BEBB5CD-2714-4761-A0C7-D97D24D267B6", "versionEndExcluding": "9.1.1.132\\(c00e131r6p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_20s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1442135-75BB-4C2C-8BBF-354CB0978489", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD9024A1-9F5A-4953-AE7C-6AB9926C0BBB", "versionEndExcluding": "9.1.0.130\\(c00e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is a path traversal vulnerability in several Huawei smartphones. The system does not sufficiently validate certain pathnames from the application. An attacker could trick the user into installing, backing up and restoring a malicious application. Successful exploit could cause information disclosure." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de salto de ruta en varios tel\u00e9fonos inteligentes Huawei. El sistema no comprueba de forma suficiente ciertos nombres de ruta de la aplicaci\u00f3n. Un atacante podr\u00eda enga\u00f1ar al usuario para que instale, realice una copia de seguridad y restaure una aplicaci\u00f3n maliciosa. Una explotaci\u00f3n con \u00e9xito podr\u00eda causar una divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2019-5251", "lastModified": "2024-11-21T04:44:36.387", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-13T15:15:11.317", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-11 19:15
Modified
2024-11-21 04:40
Severity ?
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
References
Impacted products
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Android Kernel Use-After-Free Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF46487-B64A-454E-AECC-D74B83170ACD", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3C19813-E823-456A-B1CE-EC0684CE1953", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", "matchCriteriaId": "146A767F-DC04-454B-9913-17D3A2B5AAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*", "matchCriteriaId": "E94F7F59-1785-493F-91A7-5F5EA5E87E4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "090AA6F4-4404-4E26-82AB-C3A22636F276", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D90857-AB13-47AF-B42A-7ADB190DB189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*", "matchCriteriaId": "804B2D7C-D890-4C4C-8A76-1760552E11BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:a320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ADE5E80-06D3-4A1B-A655-FBB6CCA03939", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:a320:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FD5E05-3C58-465F-9D4F-ECC2CD78DCFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D421A96-E6E9-4B27-ADE0-D8E87A82EEDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFB4541D-5EF7-4266-BFF3-2DDEC95E8012", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*", "matchCriteriaId": "347E9E3E-941C-4109-B59F-B9BB05486B34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*", "matchCriteriaId": "8155BF5F-DD1B-4AB4-81F8-9BCE6A8821AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8E7549A-DE35-4274-B3F6-22D51C7A6613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6D335F3-297A-4554-A0DC-E21B32DB2942", "versionEndExcluding": "10.0.0.162\\(c00e156r2p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:alp-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6BCC614-F819-4848-A575-1EA8165ACA38", "versionEndExcluding": "10.0.0.162\\(c01e156r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7918CD6-341B-4FCC-BD31-30B8952192C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C3D122C-8B73-4D58-A82F-1A4AC75DD0A9", "versionEndExcluding": "9.1.0.126\\(c00e126r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CCF81FB-C379-4D15-9CA7-E59974F53B77", "versionEndExcluding": "9.1.0.165\\(c00e165r2p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43F6F4AE-1938-4E92-8DBD-A80B703EDCA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3E53657-BC96-4EB4-8AC5-865346E732CC", "versionEndExcluding": "9.1.0.165\\(c00e165r2p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*", "matchCriteriaId": "C56298B1-7923-44E1-B9D5-78C030792209", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ares-tl00chw_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2934E6C1-FDAE-495B-9D02-8BD40B186F5F", "versionEndExcluding": "8.2.0.163\\(c01r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ares-tl00chw:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A210C7-08C6-4FDA-951B-AA9DA99F97DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "118F23B4-3D14-47DA-8382-D2AA89516483", "versionEndExcluding": "10.0.0.170\\(c786e170r2p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "B11D6D9B-335B-404C-88F3-590DF9E5D878", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "72254170-D96B-479B-86DD-9E9A93A7A675", "versionEndExcluding": "9.1.0.300\\(c432e4r1p11t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", "matchCriteriaId": "551386D1-3D02-4319-B2A2-1AAE80F7F249", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F005F9E1-E61D-4559-AF6B-3ECFEDA687AF", "versionEndExcluding": "10.0.0.170\\(c01e170r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BFDE403-5A29-4A02-8E62-041E4A23ADD2", "versionEndExcluding": "8.0.0.377\\(c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FA823EC-2A56-4C48-8FB5-317B6ED81E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865F26AC-8EA6-4003-953C-1FF933AC2A25", "versionEndExcluding": "9.1.0.351\\(c432e5r1p13t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F36EF5C3-FF4A-4849-97C3-FD4BC05FBCD5", "versionEndExcluding": "9.1.0.333\\(c01e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CE70011-5F76-460B-ABB5-7C738B0AB2CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B00FF2D-9E0B-4C38-9C6B-23052D7B6339", "versionEndExcluding": "8.1.0.186\\(c00gt\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D4D3605-6171-437D-9319-068DC8E9E7E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "617327F7-0DFA-4239-BF02-FA0B22AAF6AF", "versionEndExcluding": "9.1.0.325\\(c432e4r1p12t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E771D6E9-1177-4579-8065-8DC0BB6A73F8", "versionEndExcluding": "9.1.0.321\\(c01e320r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F60E9A-0ACB-4E44-ADFB-771C695FCF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:duke-l09i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "88B97220-A86A-4F07-8DCA-9E44DBA7137F", "versionEndExcluding": "9.0.1.171\\(c675e6r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:duke-l09i:-:*:*:*:*:*:*:*", "matchCriteriaId": "90C6E2FE-741F-4241-A123-F6934948BB12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4", "versionEndExcluding": "1.0.0.190\\(c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC591FA6-55E1-4628-AE43-CD1E2A4980E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:figo-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "181B057A-E12F-44A7-BEF3-3D0F78D5BE7A", "versionEndExcluding": "9.1.0.130\\(c00e115r2p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:figo-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1319FFD-91B6-4A56-BF45-256692D75FDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AED8A17-5120-4F1F-819B-C2592FC73411", "versionEndExcluding": "9.1.0.128\\(c00e112r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DF7DFEE-5C99-4C65-B3D8-AEE21E81A6BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:florida-l03_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "011099DF-3D08-417C-A4BE-838EC9755F48", "versionEndExcluding": "9.1.0.154\\(c605e7r1p2t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:florida-l03:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D7A1E5A-A17C-4495-82A0-0A7C58185971", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A5627E2-1D73-40B2-A2E7-864AD016E07C", "versionEndExcluding": "9.1.0.154\\(c605e7r1p2t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*", "matchCriteriaId": "88CD5EEC-DA40-4B35-A2CD-6F48147F0810", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49F91DCF-B3DF-4087-A608-0E6A06DE6FA4", "versionEndExcluding": "9.1.0.150\\(c636e6r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1387541-860F-43AE-809B-AFA9338DC378", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1E7E0ED-EB2E-4A55-B81D-8ECE3FD3AE58", "versionEndExcluding": "9.1.0.128\\(c01e112r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4776C729-200A-4D86-B635-185B65FC2570", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_rs_firmware:9.1.0.321\\(c786e320r1p1t8\\):*:*:*:*:*:*:*", "matchCriteriaId": "887851AE-6FD5-4C7D-AAB5-2791E98DF578", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD07EB-20AB-4E6F-B009-60A2C08C3B1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3A590F5-A49B-4752-9EF0-290A03055D67", "versionEndExcluding": "9.1.0.312\\(c00e312r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*", "matchCriteriaId": "7492911B-4242-4947-9DED-9F48FC0875CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05A03D81-1266-40CF-8FB1-E91B02544D6B", "versionEndExcluding": "9.1.0.200\\(c605e4r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0D11586-3604-4609-8643-25778B8A239D", "versionEndExcluding": "9.1.0.200\\(c635e5r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B7E4CBB-A552-46F6-97C5-EA8C80B7E156", "versionEndExcluding": "9.1.0.246\\(c432e6r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D327D03E-A9A5-4DEA-9E99-E21CD6FE352D", "versionEndExcluding": "9.1.0.297\\(c605e4r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "F48ABE15-BC87-4B02-8B39-94DA1DC96B92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9017B3E4-3C5A-42B4-84E6-DF61C4E49DF0", "versionEndExcluding": "9.1.0.210\\(c01e110r1p9t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "564CA70A-8211-4C36-B8C6-CF29369E43D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "64C5F693-BB20-4061-8614-11BCD9F95117", "versionEndExcluding": "9.1.0.351\\(c00e351r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF68FFB0-01F8-4937-8BF4-36866F02E9A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2C2381E-886E-4992-873F-BF41B24AD4D7", "versionEndExcluding": "9.1.0.200\\(c636e4r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "40066CF9-0528-40BB-8355-BEB7F187600A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AD38BEC-57FC-468A-8AAF-B56408575E45", "versionEndExcluding": "9.1.0.200\\(c636e4r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1733163A-DE27-488D-8A56-289A7AB629DC", "versionEndExcluding": "9.1.0.201\\(c636e4r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DA5C946-EDC4-4219-B745-75388B292BF0", "versionEndExcluding": "9.1.0.201\\(c636e4r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "40066CF9-0528-40BB-8355-BEB7F187600A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6800926-B3F6-4820-8D05-1153F38A792A", "versionEndExcluding": "9.1.0.201\\(zafc185e4r1p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "40066CF9-0528-40BB-8355-BEB7F187600A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ABB62EE-FCEC-41E1-9640-A4E9D64B9819", "versionEndExcluding": "9.1.0.201\\(zafc185e4r1p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "D316DCAD-2DE7-49F3-995A-10EBFA693398", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3BB4FCB-BDB1-4EFD-BE78-F16D56B63CDD", "versionEndExcluding": "10.1.0.214\\(c10e5r4p3\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2187FAFD-772A-4200-AB9E-067DC8422890", "versionEndExcluding": "9.1.0.260\\(c00e120r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:johnson-tl00d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B6B7116-2FE3-4188-8E91-83365E15B5AF", "versionEndExcluding": "9.1.0.219\\(c01e18r3p2t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "566629E0-84F2-4DFA-A20E-2D20C472E4B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:leland-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10FD6A92-DCCC-413A-8871-2DB58E6ED2EE", "versionEndExcluding": "9.1.0.130\\(c00e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:leland-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C42CB5B-492C-40B0-9230-B15F540B121B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:leland-l21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9233AB6A-2075-4615-8EA1-6088238BE099", "versionEndExcluding": "9.1.0.156\\(c185e5r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A663ACC5-FC2D-4FD7-BA9E-55344E257D4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:leland-l32a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4626E56-367C-4C0A-B920-C4138FF557DC", "versionEndExcluding": "9.1.0.153\\(c675e6r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7704B5F-4164-477C-A528-2998092C81D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:leland-tl10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C54C4BF8-3F83-4E9C-8CD9-9F59B7BCD859", "versionEndExcluding": "9.1.0.130\\(c01e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB8A667-95DE-4087-8418-49F5ACE194BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:leland-tl10c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2BA2E31-DAC3-4CD3-8578-1FA190B815A9", "versionEndExcluding": "9.1.0.130\\(c01e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11CB58EA-972E-460F-95F4-5413E05DA04C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lelandp-al00c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A27CC4DE-5A6A-40CD-BAE7-57B070B463EE", "versionEndExcluding": "9.1.0.130\\(c00e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD659D6-F838-4668-901A-0C17AB18E7C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lelandp-l22c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "06C48B38-0555-4116-B19A-58CC5FF2C80C", "versionEndExcluding": "9.1.0.156\\(c636e5r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*", "matchCriteriaId": "80D7FA39-2EE4-49F8-9EF4-009304DB6108", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:neo-al00d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DD3B902-FFD3-4F1D-8355-9DDC0A2C5275", "versionEndExcluding": "9.1.0.321\\(c786e320r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4B07FEC-514D-4A51-B26B-02254A867DC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B4B9600-877F-458C-8E89-40E0B0D21E8A", "versionEndExcluding": "10.1.0.160\\(c00e160r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:rhone-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "509E4F2C-2248-4B3B-8ABA-E52850E17B6C", "versionEndExcluding": "8.0.0.376\\(c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "4584E368-FDA6-41FD-923F-74A30E404967", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:stanford-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C3D3655-4B7C-4211-9F41-F01C34A8EB70", "versionEndExcluding": "9.1.0.211\\(c635e2r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:stanford-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BE2AB5-C033-41E2-A1EF-9DCAE8F2120B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:stanford-l09s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D939D905-AD5E-4576-B381-921DA6FF7F57", "versionEndExcluding": "9.1.0.210\\(c432e2r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5091556-29A3-4781-A6CA-FB0BD03DEB01", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE6D5B81-ED8D-41C1-88DD-9FD23EBD1ABE", "versionEndExcluding": "9.1.0.212\\(c00e62r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A35E71-4D6A-494D-882B-987CE16E3467", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA5AAC87-00E5-4C00-95F2-6D9A9300954A", "versionEndExcluding": "9.1.0.212\\(c01e62r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C93EE0CF-AFF9-40B8-B306-3BC86F679B90", "versionEndExcluding": "9.1.0.212\\(c00e62r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1ECB2A68-D67D-492F-9803-7524D96B735B", "versionEndExcluding": "10.0.0.175\\(c00e59r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E60D3DEC-EAEC-44AF-9CFC-6A2174C2D8D1", "versionEndExcluding": "10.0.0.175\\(c01e59r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC1976-E07B-4464-84DB-EACAE30D97E5", "versionEndExcluding": "10.1.0.160\\(c00e160r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "562D05D2-CC9E-4973-9E8D-B40C0ED6C721", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2221682B-7C40-43F0-8BE4-64872D0388E6", "versionEndExcluding": "10.1.0.231\\(c10e3r3p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C61685-A7A9-4E2E-BA7B-15A3C32B3F4B", "versionEndExcluding": "10.1.0.160\\(c01e160r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4177D27-D234-4BBF-A4D9-1C0DCE5B322C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "687E4FF2-3AA5-4E10-9911-6634A77EDCF1", "versionEndExcluding": "9.1.0.130\\(c00e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095" }, { "lang": "es", "value": "Un uso de la memoria previamente liberada en el archivo binder.c, permite una elevaci\u00f3n de privilegios desde una aplicaci\u00f3n en el kernel de Linux. No es requerida una interacci\u00f3n del usuario para explotar esta vulnerabilidad, sin embargo, la explotaci\u00f3n necesita de la instalaci\u00f3n de una aplicaci\u00f3n local maliciosa o una vulnerabilidad separada en una aplicaci\u00f3n de red. Producto: Android; ID de Android: A-141720095" } ], "id": "CVE-2019-2215", "lastModified": "2024-11-21T04:40:27.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-11T19:15:10.947", "references": [ { "source": "security@android.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html" }, { "source": "security@android.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "security@android.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html" }, { "source": "security@android.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/38" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en" }, { "source": "security@android.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "source": "security@android.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "source": "security@android.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/11" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2019-10-01" }, { "source": "security@android.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4186-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Nov/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2019-10-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4186-1/" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-14 00:15
Modified
2024-11-21 04:44
Severity ?
Summary
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | enjoy_8_plus_firmware | * | |
huawei | enjoy_8_plus | - | |
huawei | y9_firmware | * | |
huawei | y9 | - | |
huawei | honor_8x_firmware | * | |
huawei | honor_8x | - | |
huawei | honor_8x_firmware | * | |
huawei | honor_8x | - | |
huawei | honor_8x_firmware | * | |
huawei | honor_8x | - | |
huawei | honor_9_lite_firmware | * | |
huawei | honor_9_lite | - | |
huawei | honor_9_lite_firmware | * | |
huawei | honor_9_lite | - | |
huawei | honor_9i_firmware | * | |
huawei | honor_9i | - | |
huawei | honor_9i_firmware | * | |
huawei | honor_9i | - | |
huawei | y6_pro_firmware | * | |
huawei | y6_pro | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:enjoy_8_plus_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EDB3B1-7A08-4D8E-A8F0-5829B35D7A3B", "versionEndExcluding": "9.1.0.124\\(c00e112r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:enjoy_8_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DC2A8F-FBFE-44BA-89C7-55B54B5AE086", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A111265A-382A-4F19-BEB9-0EAB59F89F40", "versionEndExcluding": "9.1.0.131\\(c432e6r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y9:-:*:*:*:*:*:*:*", "matchCriteriaId": "92574DA9-4E40-48A7-AE10-72805CCAE4A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E5DB1A9-827C-495A-8A72-B8644BCABB57", "versionEndExcluding": "9.1.0.217\\(c00e15r3p2t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7635502-0FD1-464E-8C64-1E8FF6235495", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7F5BCE2-46AF-4C24-98F0-504615A42B3E", "versionEndExcluding": "9.1.0.237\\(c432e1r3p2t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7635502-0FD1-464E-8C64-1E8FF6235495", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60DD085C-5447-44DE-ABDD-2A0C327BACC9", "versionEndExcluding": "9.1.0.237\\(c636e2r4p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7635502-0FD1-464E-8C64-1E8FF6235495", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DDE66A3-79DE-419C-B094-E1FD05AC6A68", "versionEndExcluding": "9.1.0.124\\(c00e112r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C92CA7BA-3A0F-4759-8129-0EF267BBA447", "versionEndExcluding": "9.1.0.136\\(c636e5r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FD14B7B-772D-4935-96E1-C7418D8DDF02", "versionEndExcluding": "9.1.0.115\\(c00e113r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BECFDDE9-57E6-42E2-B545-AF5AC373B6C1", "versionEndExcluding": "9.1.0.122\\(c636e4r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E73A4B-72E9-4449-A76D-2A4300CFCC23", "versionEndExcluding": "9.1.0.248\\(c636e5r3p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6F54999-3926-438D-BF21-8417C6B7A175", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant." }, { "lang": "es", "value": "Hay una vulnerabilidad de autenticaci\u00f3n inapropiada en los tel\u00e9fonos inteligentes Huawei (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). El componente applock no realiza una autenticaci\u00f3n suficiente en una condici\u00f3n extra\u00f1a. La explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante usar la aplicaci\u00f3n bloqueada por applock en un instante." } ], "id": "CVE-2019-5252", "lastModified": "2024-11-21T04:44:36.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-14T00:15:11.040", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-12-13 23:15
Modified
2024-11-21 04:44
Severity ?
Summary
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BB97444-78F0-42E8-BFD9-B89581D3CF78", "versionEndExcluding": "9.0.0.167\\(c00e85r2p20t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "394490F2-5E47-4A28-A71C-075DBBA34C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA00374C-6305-4345-8519-4B499A20F99F", "versionEndExcluding": "9.0.0.159\\(c432e4r1p9t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "394490F2-5E47-4A28-A71C-075DBBA34C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51F963B1-C9D3-44A4-B7C9-206FF9A2503A", "versionEndExcluding": "9.0.0.177\\(c185e2r1p12t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "394490F2-5E47-4A28-A71C-075DBBA34C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2990333D-857C-4C65-B940-978447168E23", "versionEndExcluding": "9.0.0.159\\(c636e2r1p12t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "394490F2-5E47-4A28-A71C-075DBBA34C9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C97C82D-1965-4B5D-A5BF-796E07B6E12E", "versionEndExcluding": "9.0.0.167\\(c00e87r2p15t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FC0AD4F-0368-4F29-ACCF-B948B8C6BE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D17EEA8-3102-42D0-ABDB-A07B180F7C4A", "versionEndExcluding": "9.0.0.159\\(c185e2r1p13t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FC0AD4F-0368-4F29-ACCF-B948B8C6BE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "292942FC-5A4B-4E4D-B6F9-B1FB22241282", "versionEndExcluding": "9.0.0.161\\(c432e4r1p11t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FC0AD4F-0368-4F29-ACCF-B948B8C6BE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8551C436-EB83-4982-A896-1804F5706C97", "versionEndExcluding": "9.0.0.159\\(c636e2r1p13t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FC0AD4F-0368-4F29-ACCF-B948B8C6BE05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC77875A-B792-4F5B-9D79-A88121825CE1", "versionEndExcluding": "9.0.0.156\\(c00e156r2p14t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*", "matchCriteriaId": "592CF37A-83FA-4C85-B5E7-1DB2297A77A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB619BE5-AEF8-4BB1-8700-198C9536A37D", "versionEndExcluding": "9.0.0.159\\(c432e4r1p9t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*", "matchCriteriaId": "592CF37A-83FA-4C85-B5E7-1DB2297A77A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_v10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E15EECD-43B1-40CA-9491-F07DF8F468B6", "versionEndExcluding": "9.0.0.159\\(c636e3r1p12t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_v10:-:*:*:*:*:*:*:*", "matchCriteriaId": "592CF37A-83FA-4C85-B5E7-1DB2297A77A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:changxiang_7s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA7A8043-4A12-42FD-A17E-FF175F20E14A", "versionEndExcluding": "9.1.0.107\\(c00e107r2p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:changxiang_7s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C49A64F9-A264-42F8-8213-10F893AF4520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p-smart_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA9D516B-8474-4194-97D3-155B13975A75", "versionEndExcluding": "9.1.0.119\\(c636e5r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p-smart:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA90F70B-C5A2-4B14-AECA-B2014FAFC3C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p-smart_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "449025DE-ABD7-437E-9B4A-7541CC184E19", "versionEndExcluding": "9.1.0.130\\(c432e8r1p5t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p-smart:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA90F70B-C5A2-4B14-AECA-B2014FAFC3C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:changxiang_8_plus_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "455F22C9-E60D-4335-9780-8068FB42DEFC", "versionEndExcluding": "9.1.0.111\\(c00e111r1p6t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:changxiang_8_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED01DFA5-3411-4D0D-B41D-9D6E3AD620FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y9_2018_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69DBAFE8-3B9B-4F2A-A902-8FA9E76B6815", "versionEndExcluding": "9.1.0.115\\(c432e5r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y9_2018:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8ED2EF-8C0B-48E7-BB76-261F1BE3B857", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y9_2018_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27FB85CA-EE8E-47E6-8BC6-D0D3F78E310B", "versionEndExcluding": "9.1.0.120\\(c636e5r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y9_2018:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8ED2EF-8C0B-48E7-BB76-261F1BE3B857", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "287546B5-A7EF-44A0-8EA9-80809C40E916", "versionEndExcluding": "9.1.0.113\\(c00e111r2p10t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61024F08-FAB3-442D-81A1-14E42B3F154B", "versionEndExcluding": "9.1.0.118\\(c636e4r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49DEB50F-8345-4509-88A8-9F804D13C358", "versionEndExcluding": "9.1.0.118\\(c185e4r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15176A7-3D9B-461B-BF23-82DBABDFB764", "versionEndExcluding": "9.1.0.121\\(c432e4r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "E571CDA8-577E-4165-A960-DAD978FD23BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A952DE4-CE00-42FB-BDBF-B024B2ABB004", "versionEndExcluding": "9.1.0.121\\(c432e4r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76911BF2-6AA5-4E8F-A0C2-50488C9645D3", "versionEndExcluding": "9.1.0.106\\(sp53c636e2r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F931151C-4D0A-44D1-9417-B467F7E148A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3574DAD1-E9B6-4D18-BD26-5EE85FB11412", "versionEndExcluding": "9.0.1.158\\(c432e6r1p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*", "matchCriteriaId": "93FB7D8B-A819-4CBB-85D1-D3984D963351", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C743611-3E88-43E1-884D-FCB906870D01", "versionEndExcluding": "9.0.1.159\\(c636e6r1p8t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*", "matchCriteriaId": "93FB7D8B-A819-4CBB-85D1-D3984D963351", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure." }, { "lang": "es", "value": "tiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en ciertos tel\u00e9fonos inteligentes Huawei (Mate 10; Mate 10 Pro; Honor V10; Changxiang 7S; P-smart; Changxiang 8 Plus; Y9 2018; Honor 9 Lite; Honor 9i; Mate 9). El software no maneja apropiadamente cierta informaci\u00f3n de aplicaciones bloqueadas mediante applock en una condici\u00f3n extra\u00f1a. La explotaci\u00f3n con \u00e9xito podr\u00eda causar una divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2019-5264", "lastModified": "2024-11-21T04:44:38.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-13T23:15:12.050", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2019-5264
Vulnerability from cvelistv5
Published
2019-12-13 23:00
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9 |
Version: Versions earlier than 9.0.0.167(C00E85R2P20T8) Version: Versions earlier than 9.0.0.159(C432E4R1P9T8) Version: Versions earlier than 9.0.0.177(C185E2R1P12T8) Version: Versions earlier than 9.0.0.159(C636E2R1P12T8) Version: Versions earlier than 9.0.0.167(C00E87R2P15T8) Version: Versions earlier than 9.0.0.159(C185E2R1P13T8) Version: Versions earlier than 9.0.0.161(C432E4R1P11T8) Version: Versions earlier than 9.0.0.159(C636E2R1P13T8) Version: Versions earlier than 9.0.0.156(C00E156R2P14T8) Version: Versions earlier than 9.0.0.159(C636E3R1P12T8) Version: Versions earlier than 9.1.0.107(C00E107R2P8T8) Version: Versions earlier than 9.1.0.119(C636E5R1P1T8) Version: Versions earlier than 9.1.0.130(C432E8R1P5T8) Version: Versions earlier than 9.1.0.111(C00E111R1P6T8) Version: Versions earlier than 9.1.0.115(C432E5R1P1T8) Version: Versions earlier than 9.1.0.120(C636E5R1P1T8) Version: Versions earlier than 9.1.0.113(C00E111R2P10T8) Version: Versions earlier than 9.1.0.118(C636E4R1P1T8) Version: Versions earlier than 9.1.0.118(C185E4R1P4T8) Version: Versions earlier than 9.1.0.121(C432E4R1P3T8) Version: Versions earlier than 9.1.0.112(C00E112R1P6T8) Version: Versions earlier 9.1.0.106(SP53C636E2R1P4T8) Version: Versions earlier than 9.0.1.158(C432E6R1P8T8) Version: Versions earlier than 9.0.1.159(C636E6R1P8T8) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 9.0.0.167(C00E85R2P20T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.159(C432E4R1P9T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.177(C185E2R1P12T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.159(C636E2R1P12T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.167(C00E87R2P15T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.159(C185E2R1P13T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.161(C432E4R1P11T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.159(C636E2R1P13T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.156(C00E156R2P14T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.0.159(C636E3R1P12T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.107(C00E107R2P8T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.119(C636E5R1P1T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.130(C432E8R1P5T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.111(C00E111R1P6T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.115(C432E5R1P1T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.120(C636E5R1P1T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.113(C00E111R2P10T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.118(C636E4R1P1T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.118(C185E4R1P4T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.121(C432E4R1P3T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.112(C00E112R1P6T8)" }, { "status": "affected", "version": "Versions earlier 9.1.0.106(SP53C636E2R1P4T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.1.158(C432E6R1P8T8)" }, { "status": "affected", "version": "Versions earlier than 9.0.1.159(C636E6R1P8T8)" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T23:00:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5264", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9", "version": { "version_data": [ { "version_value": "Versions earlier than 9.0.0.167(C00E85R2P20T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C432E4R1P9T8)" }, { "version_value": "Versions earlier than 9.0.0.177(C185E2R1P12T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C636E2R1P12T8)" }, { "version_value": "Versions earlier than 9.0.0.167(C00E87R2P15T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C185E2R1P13T8)" }, { "version_value": "Versions earlier than 9.0.0.161(C432E4R1P11T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C636E2R1P13T8)" }, { "version_value": "Versions earlier than 9.0.0.156(C00E156R2P14T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C432E4R1P9T8)" }, { "version_value": "Versions earlier than 9.0.0.159(C636E3R1P12T8)" }, { "version_value": "Versions earlier than 9.1.0.107(C00E107R2P8T8)" }, { "version_value": "Versions earlier than 9.1.0.119(C636E5R1P1T8)" }, { "version_value": "Versions earlier than 9.1.0.130(C432E8R1P5T8)" }, { "version_value": "Versions earlier than 9.1.0.111(C00E111R1P6T8)" }, { "version_value": "Versions earlier than 9.1.0.115(C432E5R1P1T8)" }, { "version_value": "Versions earlier than 9.1.0.120(C636E5R1P1T8)" }, { "version_value": "Versions earlier than 9.1.0.113(C00E111R2P10T8)" }, { "version_value": "Versions earlier than 9.1.0.118(C636E4R1P1T8)" }, { "version_value": "Versions earlier than 9.1.0.118(C185E4R1P4T8)" }, { "version_value": "Versions earlier than 9.1.0.121(C432E4R1P3T8)" }, { "version_value": "Versions earlier than 9.1.0.112(C00E112R1P6T8)" }, { "version_value": "Versions earlier 9.1.0.106(SP53C636E2R1P4T8)" }, { "version_value": "Versions earlier than 9.0.1.158(C432E6R1P8T8)" }, { "version_value": "Versions earlier than 9.0.1.159(C636E6R1P8T8)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition. Successful exploit could cause information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191211-01-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5264", "datePublished": "2019-12-13T23:00:29", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-2215
Vulnerability from cvelistv5
Published
2019-10-11 18:16
Modified
2024-08-04 18:42
Severity ?
EPSS score ?
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
References
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2019-10-01 | x_refsource_CONFIRM | |
http://seclists.org/fulldisclosure/2019/Oct/38 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html | x_refsource_MISC | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20191031-0005/ | x_refsource_CONFIRM | |
https://seclists.org/bugtraq/2019/Nov/11 | mailing-list, x_refsource_BUGTRAQ | |
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html | x_refsource_MISC | |
https://usn.ubuntu.com/4186-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html | mailing-list, x_refsource_MLIST | |
http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:42:50.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2019-10-01" }, { "name": "20191018 CVE 2019-2215 Android Binder Use After Free", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/38" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Nov/11" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "USN-4186-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4186-1/" }, { "name": "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html" }, { "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095" } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-02T19:06:43", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2019-10-01" }, { "name": "20191018 CVE 2019-2215 Android Binder Use After Free", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Oct/38" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Nov/11" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "USN-4186-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4186-1/" }, { "name": "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html" }, { "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2019-2215", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2019-10-01", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2019-10-01" }, { "name": "20191018 CVE 2019-2215 Android Binder Use After Free", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Oct/38" }, { "name": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en" }, { "name": "https://security.netapp.com/advisory/ntap-20191031-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20191031-0005/" }, { "name": "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Nov/11" }, { "name": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html" }, { "name": "USN-4186-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4186-1/" }, { "name": "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html" }, { "name": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html" }, { "name": "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2019-2215", "datePublished": "2019-10-11T18:16:48", "dateReserved": "2018-12-10T00:00:00", "dateUpdated": "2024-08-04T18:42:50.933Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5252
Vulnerability from cvelistv5
Published
2019-12-13 23:12
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro |
Version: Versions earlier than 9.1.0.131(C432E6R1P5T8),Versions earlier than 9.1.0.139(C636E6R1P5T8),Versions earlier than 9.1.0.217(C00E15R3P2T8),Versions earlier than 9.1.0.237(C432E1R3P2T8),Versions earlier than 9.1.0.237(C636E2R4P1T8),Versions earlier than 9.1.0.124(C00E112R2P10T8),Versions earlier than 9.1.0.136(C636E5R1P5T8),Versions earlier than 9.1.0.115(C00E113R1P6T8),Versions earlier than 9.1.0.122(C636E4R1P4T8),Versions earlier than 9.1.0.248(C636E5R3P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 9.1.0.131(C432E6R1P5T8),Versions earlier than 9.1.0.139(C636E6R1P5T8),Versions earlier than 9.1.0.217(C00E15R3P2T8),Versions earlier than 9.1.0.237(C432E1R3P2T8),Versions earlier than 9.1.0.237(C636E2R4P1T8),Versions earlier than 9.1.0.124(C00E112R2P10T8),Versions earlier than 9.1.0.136(C636E5R1P5T8),Versions earlier than 9.1.0.115(C00E113R1P6T8),Versions earlier than 9.1.0.122(C636E4R1P4T8),Versions earlier than 9.1.0.248(C636E5R3P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Authentication", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T23:12:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro", "version": { "version_data": [ { "version_value": "Versions earlier than 9.1.0.131(C432E6R1P5T8),Versions earlier than 9.1.0.139(C636E6R1P5T8),Versions earlier than 9.1.0.217(C00E15R3P2T8),Versions earlier than 9.1.0.237(C432E1R3P2T8),Versions earlier than 9.1.0.237(C636E2R4P1T8),Versions earlier than 9.1.0.124(C00E112R2P10T8),Versions earlier than 9.1.0.136(C636E5R1P5T8),Versions earlier than 9.1.0.115(C00E113R1P6T8),Versions earlier than 9.1.0.122(C636E4R1P4T8),Versions earlier than 9.1.0.248(C636E5R3P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-01-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5252", "datePublished": "2019-12-13T23:12:50", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-5251
Vulnerability from cvelistv5
Published
2019-12-13 14:30
Modified
2024-08-04 19:47
Severity ?
EPSS score ?
Summary
There is a path traversal vulnerability in several Huawei smartphones. The system does not sufficiently validate certain pathnames from the application. An attacker could trick the user into installing, backing up and restoring a malicious application. Successful exploit could cause information disclosure.
References
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Honor V10;P30;Mate 20;Honor 9 Lite;Honor 9i;M6;P30 Pro;Honor 20s |
Version: Versions earlier than 9.1.0.333(C00E333R2P1T8) Version: Versions earlier than 9.1.0.226(C00E220R2P1) Version: Versions earlier than 9.1.0.130(C00E115R2P8T8) Version: Versions earlier than 9.1.0.139(C00E133R3P1) Version: Versions earlier than 9.1.0.130(C00E112R2P10T8) Version: Versions earlier than 9.1.0.143(C636E5R1P5T8) Version: Versions earlier than 9.1.0.120(C00E113R1P6T8) Version: Versions earlier than 9.1.1.150(C00E150R1P150) Version: Versions earlier than 9.1.0.226(C00E210R2P1) Version: Versions earlier than 9.1.1.132(C00E131R6P1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:47:56.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Honor V10;P30;Mate 20;Honor 9 Lite;Honor 9i;M6;P30 Pro;Honor 20s", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions earlier than 9.1.0.333(C00E333R2P1T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.226(C00E220R2P1)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.130(C00E115R2P8T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.139(C00E133R3P1)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.130(C00E112R2P10T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.143(C636E5R1P5T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.120(C00E113R1P6T8)" }, { "status": "affected", "version": "Versions earlier than 9.1.1.150(C00E150R1P150)" }, { "status": "affected", "version": "Versions earlier than 9.1.0.226(C00E210R2P1)" }, { "status": "affected", "version": "Versions earlier than 9.1.1.132(C00E131R6P1)" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a path traversal vulnerability in several Huawei smartphones. The system does not sufficiently validate certain pathnames from the application. An attacker could trick the user into installing, backing up and restoring a malicious application. Successful exploit could cause information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Path Traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-13T14:30:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2019-5251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Honor V10;P30;Mate 20;Honor 9 Lite;Honor 9i;M6;P30 Pro;Honor 20s", "version": { "version_data": [ { "version_value": "Versions earlier than 9.1.0.333(C00E333R2P1T8)" }, { "version_value": "Versions earlier than 9.1.0.226(C00E220R2P1)" }, { "version_value": "Versions earlier than 9.1.0.130(C00E115R2P8T8)" }, { "version_value": "Versions earlier than 9.1.0.139(C00E133R3P1)" }, { "version_value": "Versions earlier than 9.1.0.130(C00E112R2P10T8)" }, { "version_value": "Versions earlier than 9.1.0.143(C636E5R1P5T8)" }, { "version_value": "Versions earlier than 9.1.0.120(C00E113R1P6T8)" }, { "version_value": "Versions earlier than 9.1.1.150(C00E150R1P150)" }, { "version_value": "Versions earlier than 9.1.0.226(C00E210R2P1)" }, { "version_value": "Versions earlier than 9.1.1.132(C00E131R6P1)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a path traversal vulnerability in several Huawei smartphones. The system does not sufficiently validate certain pathnames from the application. An attacker could trick the user into installing, backing up and restoring a malicious application. Successful exploit could cause information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en", "refsource": "MISC", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191204-03-smartphone-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2019-5251", "datePublished": "2019-12-13T14:30:18", "dateReserved": "2019-01-04T00:00:00", "dateUpdated": "2024-08-04T19:47:56.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }