Vulnerabilites related to huawei - madrid-al00a
Vulnerability from fkie_nvd
Published
2019-08-14 17:15
Modified
2024-11-21 04:51
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
References
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.htmlMailing List, Third Party Advisory
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.htmlMailing List, Third Party Advisory
cret@cert.orghttp://seclists.org/fulldisclosure/2019/Aug/11Mailing List, Third Party Advisory
cret@cert.orghttp://seclists.org/fulldisclosure/2019/Aug/13Mailing List, Third Party Advisory
cret@cert.orghttp://seclists.org/fulldisclosure/2019/Aug/14Mailing List, Third Party Advisory
cret@cert.orghttp://seclists.org/fulldisclosure/2019/Aug/15Mailing List, Third Party Advisory
cret@cert.orghttp://www.cs.ox.ac.uk/publications/publication12404-abstract.htmlThird Party Advisory
cret@cert.orghttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-enThird Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:2975Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3055Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3076Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3089Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3165Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3187Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3217Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3218Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3220Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3231Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3309Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2019:3517Third Party Advisory
cret@cert.orghttps://access.redhat.com/errata/RHSA-2020:0204Third Party Advisory
cret@cert.orghttps://lists.debian.org/debian-lts-announce/2019/09/msg00014.htmlMailing List, Third Party Advisory
cret@cert.orghttps://lists.debian.org/debian-lts-announce/2019/09/msg00015.htmlMailing List, Third Party Advisory
cret@cert.orghttps://lists.debian.org/debian-lts-announce/2019/09/msg00025.htmlMailing List, Third Party Advisory
cret@cert.orghttps://usn.ubuntu.com/4115-1/Third Party Advisory
cret@cert.orghttps://usn.ubuntu.com/4118-1/Third Party Advisory
cret@cert.orghttps://usn.ubuntu.com/4147-1/Third Party Advisory
cret@cert.orghttps://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/Third Party Advisory
cret@cert.orghttps://www.kb.cert.org/vuls/id/918987/Third Party Advisory, US Government Resource
cret@cert.orghttps://www.usenix.org/conference/usenixsecurity19/presentation/antonioliThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/11Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/13Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/14Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/15Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.cs.ox.ac.uk/publications/publication12404-abstract.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-enThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:2975Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3055Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3076Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3089Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3165Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3187Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3217Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3218Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3220Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3231Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3309Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3517Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2020:0204Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00015.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/09/msg00025.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4115-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4118-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4147-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/918987/Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.usenix.org/conference/usenixsecurity19/presentation/antonioliThird Party Advisory
Impacted products
Vendor Product Version
google android -
blackberry blackberry -
apple iphone_os 12.4
apple mac_os_x 10.12.6
apple mac_os_x 10.13.6
apple mac_os_x 10.14.5
apple tvos 12.4
apple watchos 5.3
canonical ubuntu_linux 16.04
canonical ubuntu_linux 18.04
canonical ubuntu_linux 19.04
debian debian_linux 8.0
opensuse leap 15.0
opensuse leap 15.1
redhat mrg_realtime 2.0
redhat virtualization_host_eus 4.2
redhat enterprise_linux 8.0
redhat enterprise_linux_aus 7.5
redhat enterprise_linux_eus 7.6
redhat enterprise_linux_eus 7.7
redhat enterprise_linux_eus 8.1
redhat enterprise_linux_eus 8.2
redhat enterprise_linux_eus 8.4
redhat enterprise_linux_for_real_time 7
redhat enterprise_linux_for_real_time 8
redhat enterprise_linux_for_real_time_eus 8.2
redhat enterprise_linux_for_real_time_eus 8.4
redhat enterprise_linux_for_real_time_for_nfv 7
redhat enterprise_linux_for_real_time_for_nfv 8
redhat enterprise_linux_for_real_time_for_nfv_eus 8.2
redhat enterprise_linux_for_real_time_for_nfv_eus 8.4
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 7.3
redhat enterprise_linux_server_aus 7.4
redhat enterprise_linux_server_aus 7.6
redhat enterprise_linux_server_aus 7.7
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_tus 7.3
redhat enterprise_linux_server_tus 7.4
redhat enterprise_linux_server_tus 7.6
redhat enterprise_linux_server_tus 7.7
redhat enterprise_linux_server_tus 8.2
redhat enterprise_linux_server_tus 8.4
redhat enterprise_linux_tus 7.6
huawei alp-al00b_firmware *
huawei alp-al00b -
huawei ares-al00b_firmware *
huawei ares-al00b -
huawei ares-al10d_firmware *
huawei ares-al10d -
huawei ares-tl00c_firmware *
huawei ares-tl00c -
huawei asoka-al00ax_firmware *
huawei asoka-al00ax -
huawei atomu-l33_firmware *
huawei atomu-l33 -
huawei atomu-l41_firmware *
huawei atomu-l41 -
huawei atomu-l42_firmware *
huawei atomu-l42 -
huawei bla-al00b_firmware *
huawei bla-al00b -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei bla-tl00b_firmware *
huawei bla-tl00b -
huawei barca-al00_firmware *
huawei barca-al00 -
huawei berkeley-al20_firmware *
huawei berkeley-al20 -
huawei berkeley-l09_firmware *
huawei berkeley-l09 -
huawei berkeley-tl10_firmware *
huawei berkeley-tl10 -
huawei cairogo-l22_firmware *
huawei cairogo-l22 -
huawei charlotte-l29c_firmware *
huawei charlotte-l29c -
huawei columbia-al10b_firmware *
huawei columbia-al10b -
huawei columbia-al10i_firmware *
huawei columbia-al10i -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei columbia-tl00d_firmware *
huawei columbia-tl00d -
huawei cornell-al00a_firmware *
huawei cornell-al00a -
huawei cornell-al00i_firmware *
huawei cornell-al00i -
huawei cornell-al00ind_firmware *
huawei cornell-al00ind -
huawei cornell-al10ind_firmware *
huawei cornell-al10ind -
huawei cornell-l29a_firmware *
huawei cornell-l29a -
huawei cornell-tl10b_firmware *
huawei cornell-tl10b -
huawei dubai-al00a_firmware *
huawei dubai-al00a -
huawei dura-al00a_firmware *
huawei dura-al00a -
huawei dura-tl00a_firmware *
huawei dura-tl00a -
huawei emily-l29c_firmware 8.1.0.156\(c605\)
huawei emily-l29c -
huawei ever-l29b_firmware *
huawei ever-l29b -
huawei figo-l23_firmware *
huawei figo-l23 -
huawei figo-l31_firmware 8.0.0.122d\(c652\)
huawei figo-l31 -
huawei figo-tl10b_firmware *
huawei figo-tl10b -
huawei florida-al20b_firmware *
huawei florida-al20b -
huawei florida-l21_firmware *
huawei florida-l21 -
huawei florida-l22_firmware *
huawei florida-l22 -
huawei florida-l23_firmware *
huawei florida-l23 -
huawei florida-tl10b_firmware *
huawei florida-tl10b -
huawei honor_20_firmware *
huawei honor_20 -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei mate_20_firmware -
huawei mate_20 -
huawei mate_20_pro_firmware -
huawei mate_20_pro -
huawei mate_20_x_firmware -
huawei mate_20_x -
huawei p_smart_firmware -
huawei p_smart -
huawei p_smart_2019_firmware -
huawei p_smart_2019 -
huawei p20_firmware -
huawei p20 -
huawei p20_pro_firmware -
huawei p20_pro -
huawei p30_firmware -
huawei p30 -
huawei p30_pro_firmware -
huawei p30_pro -
huawei y5_2018_firmware -
huawei y5_2018 -
huawei y5_lite_firmware -
huawei y5_lite -
huawei y6_2019_firmware -
huawei y6_2019 -
huawei y6_prime_2018_firmware -
huawei y6_prime_2018 -
huawei y6_pro_2019_firmware -
huawei y6_pro_2019 -
huawei y7_2019_firmware -
huawei y7_2019 -
huawei y9_2019_firmware -
huawei y9_2019 -
huawei nova_3_firmware -
huawei nova_3 -
huawei nova_4_firmware -
huawei nova_4 -
huawei nova_5_firmware -
huawei nova_5 -
huawei nova_5i_pro_firmware -
huawei nova_5i_pro -
huawei nova_lite_3_firmware -
huawei nova_lite_3 -
huawei harry-al00c_firmware -
huawei harry-al00c -
huawei harry-al10b_firmware -
huawei harry-al10b -
huawei harry-tl00c_firmware -
huawei harry-tl00c -
huawei hima-l29c_firmware -
huawei hima-l29c -
huawei honor_10_lite_firmware -
huawei honor_10_lite -
huawei honor_8a_firmware -
huawei honor_8a -
huawei honor_8x_firmware -
huawei honor_8x -
huawei honor_view_10_firmware -
huawei honor_view_10 -
huawei honor_view_20_firmware -
huawei honor_view_20 -
huawei jakarta-al00a_firmware -
huawei jakarta-al00a -
huawei johnson-tl00d_firmware -
huawei johnson-tl00d -
huawei johnson-tl00f_firmware -
huawei johnson-tl00f -
huawei katyusha-al00a_firmware -
huawei katyusha-al00a -
huawei laya-al00ep_firmware -
huawei laya-al00ep -
huawei leland-l21a_firmware -
huawei leland-l21a -
huawei leland-l31a_firmware -
huawei leland-l31a -
huawei leland-l32a_firmware -
huawei leland-l32a -
huawei leland-l32c_firmware -
huawei leland-l32c -
huawei leland-l42a_firmware -
huawei leland-l42a -
huawei leland-l42c_firmware -
huawei leland-l42c -
huawei leland-tl10b_firmware -
huawei leland-tl10b -
huawei leland-tl10c_firmware -
huawei leland-tl10c -
huawei lelandp-al00c_firmware -
huawei lelandp-al00c -
huawei lelandp-al10b_firmware -
huawei lelandp-al10b -
huawei lelandp-al10d_firmware -
huawei lelandp-al10d -
huawei lelandp-l22a_firmware -
huawei lelandp-l22a -
huawei lelandp-l22c_firmware -
huawei lelandp-l22c -
huawei lelandp-l22d_firmware -
huawei lelandp-l22d -
huawei london-al40ind_firmware -
huawei london-al40ind -
huawei madrid-al00a_firmware -
huawei madrid-al00a -
huawei madrid-tl00a_firmware -
huawei madrid-tl00a -
huawei neo-al00d_firmware -
huawei neo-al00d -
huawei paris-al00ic_firmware -
huawei paris-al00ic -
huawei paris-l21b_firmware -
huawei paris-l21b -
huawei paris-l21meb_firmware -
huawei paris-l21meb -
huawei paris-l29b_firmware -
huawei paris-l29b -
huawei potter-al00c_firmware -
huawei potter-al00c -
huawei potter-al10a_firmware -
huawei potter-al10a -
huawei princeton-al10b_firmware -
huawei princeton-al10b -
huawei princeton-al10d_firmware -
huawei princeton-al10d -
huawei princeton-tl10c_firmware -
huawei princeton-tl10c -
huawei sydney-al00_firmware -
huawei sydney-al00 -
huawei sydney-l21_firmware -
huawei sydney-l21 -
huawei sydney-l21br_firmware -
huawei sydney-l21br -
huawei sydney-l22_firmware -
huawei sydney-l22 -
huawei sydney-l22br_firmware -
huawei sydney-l22br -
huawei sydney-tl00_firmware -
huawei sydney-tl00 -
huawei sydneym-al00_firmware -
huawei sydneym-al00 -
huawei sydneym-l01_firmware -
huawei sydneym-l01 -
huawei sydneym-l03_firmware -
huawei sydneym-l03 -
huawei sydneym-l21_firmware -
huawei sydneym-l21 -
huawei sydneym-l22_firmware -
huawei sydneym-l22 -
huawei sydneym-l23_firmware -
huawei sydneym-l23 -
huawei tony-al00b_firmware -
huawei tony-al00b -
huawei tony-tl00b_firmware -
huawei tony-tl00b -
huawei yale-al00a_firmware -
huawei yale-al00a -
huawei yale-al50a_firmware -
huawei yale-al50a -
huawei yale-l21a_firmware -
huawei yale-l21a -
huawei yale-l61c_firmware -
huawei yale-l61c -
huawei yale-tl00b_firmware -
huawei yale-tl00b -
huawei yalep-al10b_firmware -
huawei yalep-al10b -
huawei imanager_neteco_firmware -
huawei imanager_neteco -
huawei imanager_neteco_6000_firmware -
huawei imanager_neteco_6000 -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei berkeley-l09_firmware *
huawei berkeley-l09 -
huawei berkeley-l09_firmware *
huawei berkeley-l09 -
huawei charlotte-l29c_firmware *
huawei charlotte-l29c -
huawei charlotte-l29c_firmware *
huawei charlotte-l29c -
huawei charlotte-l29c_firmware *
huawei charlotte-l29c -
huawei charlotte-l29c_firmware *
huawei charlotte-l29c -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei cornell-l29a_firmware *
huawei cornell-l29a -
huawei cornell-l29a_firmware *
huawei cornell-l29a -
huawei cornell-l29a_firmware *
huawei cornell-l29a -
huawei emily-l29c_firmware *
huawei emily-l29c -
huawei emily-l29c_firmware *
huawei emily-l29c -
huawei emily-l29c_firmware *
huawei emily-l29c -
huawei emily-l29c_firmware *
huawei emily-l29c -
huawei emily-l29c_firmware *
huawei emily-l29c -
huawei figo-l31_firmware *
huawei figo-l31 -
huawei figo-l31_firmware *
huawei figo-l31 -
huawei figo-l31_firmware *
huawei figo-l31 -
huawei figo-l31_firmware *
huawei figo-l31 -
huawei figo-l31_firmware *
huawei figo-l31 -
huawei florida-l21_firmware *
huawei florida-l21 -
huawei honor_20_firmware *
huawei honor_20 -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei honor_20_pro_firmware *
huawei honor_20_pro -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:blackberry:blackberry:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8239084-1BAF-48F8-A57C-BEB0036DA346",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E54551-6C9D-4E0C-AE9F-7585B0513B3F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "E84CE847-550E-445B-8972-2FB5BCF6B04F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "04D7DAFB-DEE4-4A71-A27C-0E34426AACE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "7BCF5B87-0AAD-4030-B439-B58990ED31DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "655F7FDF-5E6F-4984-8EBA-95B49BB14A6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "73DE60EC-0D7E-4D02-B7F1-AA0799088FE0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                     matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1E78106-58E6-4D59-990F-75DA575BFAD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B620311B-34A3-48A6-82DF-6F078D7A4493",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:redhat:virtualization_host_eus:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9708C6C-5DD1-43D8-8BD4-71BAFC3C997B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4CFF558-3C47-480D-A2F0-BABF26042943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_aus:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D067B04-CDF9-4395-83FA-17145267BA18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "83737173-E12E-4641-BC49-0BD84A6B29D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "92BC9265-6959-4D37-BE5E-8C45E98992F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "831F0F47-3565-4763-B16F-C87B1FF2035E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2B15608-BABC-4663-A58F-B74BD2D1A734",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBF9BCF3-187F-410A-96CA-9C47D3ED6924",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5749E2F6-8B59-439C-9E60-49466C2DD157",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8F8F038-6115-445E-AFCB-974BAAEBD876",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                     matchCriteriaId: "36E85B24-30F2-42AB-9F68-8668C0FCC5E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5CB3640-F55B-4127-875A-2F52D873D179",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E082C33-2F83-4AF1-A91D-94EF05DE98A6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "803D7386-1E7C-451E-A52F-91B6039BB97F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "98381E61-F082-4302-B51F-5648884F998B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7431ABC1-9252-419E-8CC1-311B41360078",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E28F226A-CBC7-4A32-BE58-398FA5B42481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC10D919-57FD-4725-B8D2-39ECB476902F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1995855A-1883-412D-B629-5436E881FF08",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6645904-D2CA-4E35-BA98-DD5F3CAB3E96",
                     versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A577297-C186-4CC4-A67D-DE7AB46FC08F",
                     versionEndExcluding: "9.1.0.160\\(c00e160r2p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F6F4AE-1938-4E92-8DBD-A80B703EDCA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "27438A38-0793-4719-BEB2-2CC44553E058",
                     versionEndExcluding: "9.1.0.160\\(c00e160r2p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56298B1-7923-44E1-B9D5-78C030792209",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-tl00c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F34FF7B9-D8B6-4C2E-A9E6-CBF407F60DDF",
                     versionEndExcluding: "9.1.0.165\\(c01e165r2p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-tl00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB4D3E8A-E271-4857-BC1F-DBC69C564530",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:asoka-al00ax_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "71BA8A3E-0112-4904-85A2-E483627874CA",
                     versionEndExcluding: "9.1.1.181\\(c00e48r6p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:asoka-al00ax:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B2C06DA-9060-468D-A89F-F5C5EE3297E4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:atomu-l33_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B380CA3-F13A-427D-874B-B8D632DDF5AB",
                     versionEndExcluding: "8.0.0.147\\(c605custc605d1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:atomu-l33:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3F378F7-5CE8-4499-8537-6FD99026DB6B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:atomu-l41_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2B15BAD-ACCC-44D7-A942-3E5DAFE1ED1C",
                     versionEndExcluding: "8.0.0.153\\(c461custc461d1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:atomu-l41:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E1129F1-BE98-456D-AB43-DFC5859635DE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:atomu-l42_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "697C30E8-BB17-44F3-8DA4-AEF9D15222ED",
                     versionEndExcluding: "8.0.0.155\\(c636custc636d1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:atomu-l42:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73932E23-6868-4A1C-B1CC-8F4E36A7114A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7282513-0D84-4A2D-A4DC-491C8F4C7184",
                     versionEndExcluding: "9.1.0.329\\(c786e320r2p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D6D9B-335B-404C-88F3-590DF9E5D878",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8979842F-0AD8-47BA-87A1-02F13EB145EA",
                     versionEndExcluding: "9.1.0.300\\(c605e2r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "00BED6E8-D790-4A57-AA1E-4A2D04832594",
                     versionEndExcluding: "9.1.0.329\\(c01e320r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4035199-8628-468D-BE58-17892D063357",
                     versionEndExcluding: "8.0.0.366\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FA823EC-2A56-4C48-8FB5-317B6ED81E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EB7A23D-805E-4DA1-AA7D-89A045BB47FD",
                     versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-al20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C219B9CA-00AE-4B6B-A1BE-63AF154F1E50",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D57889-9678-4A25-B352-65A99104B72E",
                     versionEndExcluding: "9.1.0.332\\(c432e5r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F36EF5C3-FF4A-4849-97C3-FD4BC05FBCD5",
                     versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CE70011-5F76-460B-ABB5-7C738B0AB2CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cairogo-l22_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E1EFD33-BC40-4DB6-B2CB-FFA616B6A65B",
                     versionEndExcluding: "cairogo-l22c461b153",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cairogo-l22:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "700FA8F3-B729-44E2-B56F-D80292BF460F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "29A8F9DA-FF8D-40C5-9CD4-66AF719DC1AC",
                     versionEndExcluding: "9.1.0.311\\(c605e2r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE2E639-BCE9-4AD2-B10D-C93CE7F7BA4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B37F0AE0-C461-4B70-B790-9606E2D27E0F",
                     versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F63CA2F-45B8-4DD3-81AE-8359929AE50B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-al10i_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3905BE38-3C2C-4B0D-B804-15A87B9DA244",
                     versionEndExcluding: "9.1.0.335\\(c675e8r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFF16336-9CFE-4D67-852B-4C356E3C5951",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F7B01B2-E3BA-49CF-B651-85404988A481",
                     versionEndExcluding: "9.1.0.350\\(c10e5r1p14t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25176953-B380-49C7-BE67-A4053DCEBADB",
                     versionEndExcluding: "8.1.0.186\\(c01gt\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BE1BB06-0403-4F46-AF76-DAD85D538907",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E07C41EF-6F24-4477-A32F-BEE404E4388E",
                     versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB5193B7-6F3F-4249-BB74-62480893CAB2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-al00i_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "344A5958-037B-4AB5-8B8E-A4FC948C95A7",
                     versionEndExcluding: "9.1.0.363\\(c675e3r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-al00i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7BB30EE-ECCE-4697-A990-F910F3B5C2B0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-al00ind_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DAC1975-0955-42EF-8242-52BEE2BDE008",
                     versionEndExcluding: "8.2.0.141\\(c675custc675d1gt\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-al00ind:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34AECCA8-6B67-4DF5-A6C9-A6F333664950",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-al10ind_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68C87563-3724-4B7F-8F33-C0B09694B164",
                     versionEndExcluding: "9.1.0.363\\(c675e2r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-al10ind:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "28D9A40E-51BC-458D-ADE6-EA680F23F2B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5589A1A9-0214-4391-BBD2-932FF53B2002",
                     versionEndExcluding: "9.1.0.336\\(c636e2r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1554916-5994-4CAE-8101-CF01B199370C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D952E67-D771-48DF-A4A9-69D6FFABE2CE",
                     versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73F60E9A-0ACB-4E44-ADFB-771C695FCF08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dubai-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6995D12-C03B-4380-BCE8-5DE2DC97E198",
                     versionEndExcluding: "8.2.0.190\\(c00r2p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dubai-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2A1EE4A-1539-4FD7-B5D8-D3725CB3A843",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EE2E6C4-BADF-4215-B31E-CCF399270B83",
                     versionEndExcluding: "1.0.0.182\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC591FA6-55E1-4628-AE43-CD1E2A4980E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dura-tl00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "86C43B18-C1BF-4DB9-92D2-D9E333F73CE3",
                     versionEndExcluding: "1.0.0.176\\(c01\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dura-tl00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E269DC2-682C-49B7-8492-F8622572C785",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:8.1.0.156\\(c605\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AF895541-98C9-4520-9CAF-36CA963F9BA0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3631A567-0F95-4477-B2DC-D1B09736140D",
                     versionEndExcluding: "9.1.0.338\\(c185e3r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEB4EC14-14DE-4AAF-A951-071B4E39270A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l23_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6D28EB2-8919-4AD2-8455-194B8AB14FFB",
                     versionEndExcluding: "9.1.0.160\\(c605e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l23:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42D1377E-92E6-472A-9734-D5DA1C8319A2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:8.0.0.122d\\(c652\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "05C2AFA5-D4B0-414D-8894-7DBF020C3A40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAFFCE6B-14C3-459B-B7CB-B8380AAAD19F",
                     versionEndExcluding: "9.1.0.130\\(c01e115r2p8t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88BDA8C0-CD09-418F-A334-E54B8E458D05",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AED8A17-5120-4F1F-819B-C2592FC73411",
                     versionEndExcluding: "9.1.0.128\\(c00e112r1p6t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF7DFEE-5C99-4C65-B3D8-AEE21E81A6BA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCE9BC91-0596-483E-8D2C-431A72A56797",
                     versionEndExcluding: "9.1.0.150\\(c185e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88CD5EEC-DA40-4B35-A2CD-6F48147F0810",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "49F91DCF-B3DF-4087-A608-0E6A06DE6FA4",
                     versionEndExcluding: "9.1.0.150\\(c636e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1387541-860F-43AE-809B-AFA9338DC378",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l23_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6498D22-6C7C-4E66-BAD7-20CFC297FBF5",
                     versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l23:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E2DAC5-FD49-4DC2-854E-71DACE1BC643",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E7E0ED-EB2E-4A55-B81D-8ECE3FD3AE58",
                     versionEndExcluding: "9.1.0.128\\(c01e112r1p6t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4776C729-200A-4D86-B635-185B65FC2570",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FEFA597A-ECA8-49E5-A1D9-44E1D1E51DD1",
                     versionEndExcluding: "9.1.0.143\\(c675e8r2p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55571AAC-B8B2-48D0-8486-BB2992A39568",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A12E685-F91D-4C04-82C5-61A9BA317A42",
                     versionEndExcluding: "9.1.0.154\\(c185e2r5p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:mate_20_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F3FB528-5C26-446F-9985-E325AB87203B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5322963-9375-4E4E-8119-895C224003AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:mate_20_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "483669DB-D71C-48BD-BA29-B971C4D423A9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2564E28F-EF08-4381-96D8-58BB7C8C0E0C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:mate_20_x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "18031A60-6047-43E5-A75D-4BF44532EFBA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FD3779B-F943-4B7E-BF82-AA4A051D02C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p_smart_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4AE3143-67EB-49B3-8B1D-DB34CCE3829C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "64C4DE1A-ACBD-4DCA-8BAD-23AE6DF4025B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p_smart_2019_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85E3D35A-F979-48D0-92F8-1DBFF7BD2562",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B141C85-AFD2-4D7C-8B72-A065B3C905F6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67931720-1EED-43CB-BB7B-BC0CCA773AC0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7492911B-4242-4947-9DED-9F48FC0875CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90F53673-A878-4935-A992-E6F61D41FD24",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B315FBC-8BF9-4256-80F9-63EFF0806BEB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p30_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE96D0C4-D43B-4AB3-A712-45F4F7F17BB8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21EE286C-8111-4F59-8CF1-13C68EA76B21",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p30_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A26F9E66-8070-4884-87D1-BD87E189B10C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DB671DB-CB5B-46E0-B221-722D051184DE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y5_2018_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BECFA24-FBD8-4320-B5C9-CDD3D5338582",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y5_2018:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFBD5328-0BFF-49F7-B2EC-E73BC6D41FF5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y5_lite_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C6AA13E-9801-401E-8E86-EE48C9BA5CAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y5_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA384300-C2B6-43B8-98F1-94488DA6CB06",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_2019_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FB50358-E75A-4B53-8780-D46F9D8B0F54",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E7053C3-4EB2-438E-9544-41ACF7A91057",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_prime_2018_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB1EA662-A8E3-45E5-A4C6-8C5E12AEA2E5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_prime_2018:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4033E6E-FFFA-40D5-9AB9-D1497AB5C314",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_pro_2019_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED2D400-55BD-437F-A98C-1E3299590B22",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B1F9660-41E0-4536-8032-57AD3E844A94",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y7_2019_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B60AB519-4416-44F6-BF9D-20E24BA0B502",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y7_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC5510EA-9A5A-4F72-AE40-AACFE58D02C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y9_2019_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A87C804-7DAA-47E2-A587-1D7541462BBC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F48ABE15-BC87-4B02-8B39-94DA1DC96B92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BBC9263-82BB-4B33-B682-A7B1A65D1577",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF68FFB0-01F8-4937-8BF4-36866F02E9A8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_4_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE87ADA6-7085-4ADA-B8F7-D863A1765580",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D1E240-F1DE-4FC0-84B7-873978A9A6B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_5_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "94DF684B-8BDD-4035-A8C7-2B565544CB81",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_5:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CF67964-B009-4209-B281-49055829BB4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_5i_pro_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BED229-03B1-43C2-9239-DAA5C9BD4F40",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_5i_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6C9D864-8A1E-475B-94B3-522D23D91288",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_lite_3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "28304195-13E1-4757-B07C-34FBA1DDA061",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EEA4B63-97F3-4BAB-B96E-4C36D9B0FDE5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:harry-al00c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A46BA4B6-A387-4D51-9278-CABE5E2C224B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DF9FAC4-0A8C-463C-8E5C-64E33D145E52",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C41532B6-FE2A-4174-B1AA-074F08B64DEC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A2BE361-1412-455E-A553-0CA9D14E4C1B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:harry-tl00c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C5067B8-4862-48CB-B6A2-E3191314EED2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E31013C1-26DA-4A6D-BBD4-BF0630EEEB66",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:hima-l29c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95F68969-FB0A-4B51-9F67-DE5021EFABAF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "366DC5C5-9276-4921-9ABD-92941B0CEE6D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_10_lite_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "42AFF1E9-D82D-4301-87FD-A8B6B7C9B75F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A298082-CC80-4316-9AEB-9E8F8B52EE88",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8x_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB09814B-81B3-4236-B3AE-EAE800678D2D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7635502-0FD1-464E-8C64-1E8FF6235495",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_10_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B72EBDE-1020-4177-BFC0-2E968FB17C29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E788B81C-69DB-4A13-AC70-1E17120CB82E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAEA5A51-8067-4160-B115-085A529CD987",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:jakarta-al00a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6067DA42-ECDC-4D11-813F-9C67CC8055AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:johnson-tl00d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B8A8714-83BD-49B7-86E8-3224DD02344E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "566629E0-84F2-4DFA-A20E-2D20C472E4B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:johnson-tl00f_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79F89951-0A96-4424-B1E3-30488876BDF7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0075F84C-492C-408D-941B-274A0A0C3B82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:katyusha-al00a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FE0B00D-B846-4771-9D3B-4ACE59DD0C5D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E3A00A-6EB8-4E04-B1BC-E7663C9C1EA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:laya-al00ep_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B4A88E4-D37E-49CC-B4A4-86CBD030131E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B3A54AE-DC30-429B-8FB8-BE6EB933E685",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l21a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF6A6123-2AC6-407F-8D1C-8A148889946E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A663ACC5-FC2D-4FD7-BA9E-55344E257D4A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l31a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697FC0BE-4EE7-41B1-B19D-6BB1377C81A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l31a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "059598D5-E1FC-4727-A29C-5904FDFA4EA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l32a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE3288B-7A63-474E-9CF6-A78C74AA2049",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7704B5F-4164-477C-A528-2998092C81D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l32c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BBA5685-AB27-4BB2-BF66-8DDEA4B25158",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l32c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "95F935A0-E7B2-4281-8D36-EB19358061D4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l42a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6983D6A-DE3C-43F5-B827-665F979E127D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l42a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C03D17FC-0921-41D2-B193-26163AEFE8F2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l42c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C067242F-C4BC-4EB2-86A5-FA508241C29D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l42c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10E950B-FDF6-4E22-9D88-60D0225466E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-tl10b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "24E8438F-9D3B-4565-AC01-AC4729B4C2A1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDB8A667-95DE-4087-8418-49F5ACE194BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-tl10c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A9BC1A3-62D9-4C51-A850-C44DC5A7DA61",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CB58EA-972E-460F-95F4-5413E05DA04C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-al00c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F5C8248-26DB-4423-A6C9-56788C9ED5CD",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BD659D6-F838-4668-901A-0C17AB18E7C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-al10b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D184ED2-0C47-41A5-9DDB-E0872249D080",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "68BCAF57-9BF8-4EB0-B6FB-1B40737FFC9F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-al10d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BD41E18-2981-43FF-8FF5-41EE3775DC6E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-al10d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33CAF53-20C8-4AB2-B728-80B6F7B5FA2A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5ADF3A6-9F52-4BFF-8FFB-E60E971AF98D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2D29D20-4F3B-4B6B-90AC-315652E47DDB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80D7FA39-2EE4-49F8-9EF4-009304DB6108",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A24E0E52-6C3B-4B4B-8F32-9467B9E56CB8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A956F54-5B4B-4103-BA45-88F8FF7D9FD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:london-al40ind_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EAB36F5-50CC-4A8C-94D3-F0E001BDEC7A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:london-al40ind:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9452809-D19E-4B63-9B84-BBD8AB4485E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:madrid-al00a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFA8110C-64B9-4346-9E46-44E87778EA2B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8B2A97-DA47-40C8-8DB5-1AE1A89559A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:madrid-tl00a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4137623C-6736-44C9-8446-22CE5DE10797",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:madrid-tl00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EE1329-D545-43F2-8D14-CBA53F3F8EFC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:neo-al00d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65161544-ACCE-4281-9B15-DD1A732A6218",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4B07FEC-514D-4A51-B26B-02254A867DC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:paris-al00ic_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "368F7A8F-B0F4-4E5C-ADB2-5EB8D3F831C8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:paris-al00ic:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "042B7861-608F-4F0C-BF5E-FF2455C9BE79",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:paris-l21b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "632F1A63-66BE-43AF-A0FA-968D4728E2C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:paris-l21b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B3765F0-677E-48FA-8A70-8F5A69660DC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:paris-l21meb_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF0531C9-2B62-40E1-8F95-430BCD42BB34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:paris-l21meb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "010590E4-2979-4AE3-9B94-7C1BC5CE0533",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:paris-l29b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38AC2BEB-0A61-4C3A-8CA4-674E5FEDC859",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "143485B2-5216-4190-8306-63D12362F6AF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:potter-al00c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AF87777-1D49-4EC9-9F5F-22090F78AF11",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "34141B01-DA8B-4029-B275-395AC11C40C4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:potter-al10a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E4E204F-462B-4743-B87B-1CB4D4DE8D29",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0CF01A3C-2E60-45B8-8D4E-58B5710FC40C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:princeton-al10b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA8E4F26-E50C-4D06-A183-1BC9F1B9072F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:princeton-al10d_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4571D5E3-E327-4C04-939E-66B5A9D0CC18",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11E6B825-CA55-4BEC-8279-3F33F7CC93EE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:princeton-tl10c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E996FA3-91E7-42EF-A73F-6948A855F886",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "35F6A54F-E004-4BE7-A6A6-3E7C300DC498",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-al00_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4118EE5-084A-4DA3-B8D4-6EAC2729A2C2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66A35E71-4D6A-494D-882B-987CE16E3467",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-l21_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6049D750-284C-4A03-95B6-1A7A0CC21BD1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C949EB56-D8A6-4D5C-98B4-3FF056536BF1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-l21br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF481690-3033-466D-966D-C9F65E6212A8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-l21br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD953016-2468-40BD-8383-9105BA297C26",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-l22_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F5D16B5-6AC5-455D-AFD7-7E01E37DC5EC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-l22:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40DAF023-9D20-4262-B5BE-F3C61906C9BC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-l22br_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0FE590-B043-4E4D-BC72-C0163ACDC194",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-l22br:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE0C17CF-D4AA-460E-815F-32FB5C8702A0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-tl00_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5072B124-1290-417C-ADEB-F39C294F23A3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-al00_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58742692-675E-4546-AB6F-8E57ECBA7C09",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-l01_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8DDCF56-3362-4DCD-9C7C-7D87D0F5A75D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FD8A442-CE31-4C9B-8474-CE0D1D18A4CF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-l03_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F3A6D05-7BC6-4FCF-BAAF-53B13008F783",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-l03:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAAB87A0-CF6A-4219-973C-EFEE5A4C6657",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-l21_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "283A05FB-8A2D-4675-870A-A804B7161941",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCE69226-79D4-4CB9-8E81-BC82A8A98095",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-l22_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5349FCB9-93CB-4945-96EA-89CBE613082D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7D9B914-5EDF-46A5-992B-EBD49191EC4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-l23_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE5E0EB1-5CBC-420F-8F3D-43C309C75A0E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-l23:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE752CEC-D5BA-4C59-A2F1-9D13B3B8A6D5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-al00b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58B13F37-2D12-490A-9757-2B1EDE00FB97",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E14B978-2A3C-4F55-8E3A-BA41AB137C33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-tl00b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F488BE9A-5B94-4D3B-9512-9BB8DA5E0391",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-al00a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5DA51C4-E32B-4EE5-9702-339789D62213",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "562D05D2-CC9E-4973-9E8D-B40C0ED6C721",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-al50a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7927B88C-7CDC-45E7-A80F-B192C0AE13ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-al50a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77360A45-7501-4243-812A-D8C3403D1F03",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-l21a_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE7B42EC-D142-4B36-BDFE-8091BB06B017",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-l61c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4168BC18-420C-42A8-B662-78D2500A4D89",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-l61c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C273A8B6-E86E-4E1B-8EEC-A84837B297F4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-tl00b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88A0C1C5-2870-4187-B899-1334572B7F87",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4177D27-D234-4BBF-A4D9-1C0DCE5B322C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yalep-al10b_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7D2E47E-4A03-49DD-894D-35173EC98A56",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D81385-913B-4A38-A712-41CAE7B78DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:imanager_neteco_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2287FD-97E0-4A11-B650-0C292A916650",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D96479E8-2B4F-4149-B61B-79ECD0524A01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC3D22C1-B967-4AAD-AEE8-7357F1AF4C3D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B8CFC69-D6E8-4163-AE0F-B85693F2555D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7087288-2C19-4DDA-A0CD-419683391002",
                     versionEndExcluding: "9.1.0.306\\(c185e2r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "126D381D-C88E-4404-9142-10002B2EB99E",
                     versionEndExcluding: "9.1.0.306\\(c432e4r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25595943-0ED9-4CF7-99AF-373C96E9FD12",
                     versionEndExcluding: "9.1.0.306\\(c636e2r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E5F5DEE-631C-45B2-BEC7-CDE64F0F2077",
                     versionEndExcluding: "9.1.0.307\\(c635e4r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BB64041-1B61-490E-BA4D-08F9B178CD7D",
                     versionEndExcluding: "9.1.0.350\\(c10e3r1p14t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA96859C-81F6-4227-B228-BF6C82451A1B",
                     versionEndExcluding: "9.1.0.350\\(c636e4r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "60FA31C3-4B67-40F9-9E39-92F7E25F50A0",
                     versionEndExcluding: "9.1.0.325\\(c185e4r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE2E639-BCE9-4AD2-B10D-C93CE7F7BA4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "54983533-DFE0-4572-B95B-2F59247D5D28",
                     versionEndExcluding: "9.1.0.325\\(c636e2r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE2E639-BCE9-4AD2-B10D-C93CE7F7BA4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AD911F9-31B9-4DE3-BC78-F40E4C6F1904",
                     versionEndExcluding: "9.1.0.328\\(c432e5r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE2E639-BCE9-4AD2-B10D-C93CE7F7BA4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "510223BA-A1EC-4408-AA5B-8BD93A6C39BF",
                     versionEndExcluding: "9.1.0.328\\(c782e10r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CE2E639-BCE9-4AD2-B10D-C93CE7F7BA4F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD2B4309-0AA2-49A5-A103-0FD0CC893E04",
                     versionEndExcluding: "9.1.0.350\\(c185e3r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77C9A1A-0B19-4976-8070-E3D79124C466",
                     versionEndExcluding: "9.1.0.350\\(c461e3r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1177D77-6C80-4FAA-8AC0-AA9A0B0FA9D7",
                     versionEndExcluding: "9.1.0.350\\(c636e3r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "74E0E881-4011-4D0E-BDE2-7FC6B0E2E28A",
                     versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC9DF73A-C61A-4043-A4D4-61A544B41E0A",
                     versionEndExcluding: "9.1.0.341\\(c185e1r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1554916-5994-4CAE-8101-CF01B199370C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D10206F8-D91D-4AB0-93F3-F39740DA707F",
                     versionEndExcluding: "9.1.0.342\\(c461e1r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1554916-5994-4CAE-8101-CF01B199370C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8360DEA6-D200-4C43-B82C-A7BF86E31B9F",
                     versionEndExcluding: "9.1.0.347\\(c432e1r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1554916-5994-4CAE-8101-CF01B199370C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9356FA3A-1DCE-4382-BDE5-B6FBBD294352",
                     versionEndExcluding: "9.1.0.311\\(c461e2r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "49A47A99-E952-4EA6-82EF-0C0099F086CF",
                     versionEndExcluding: "9.1.0.325\\(c185e2r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF430412-8A6C-4E8C-8904-D8FA39A9E36A",
                     versionEndExcluding: "9.1.0.325\\(c636e7r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7057F392-1D2F-4B69-9500-4D4BA20EC3FA",
                     versionEndExcluding: "9.1.0.326\\(c635e2r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "392B15A3-61D7-4FE1-A514-5D0B2F7E9A11",
                     versionEndExcluding: "9.1.0.328\\(c432e7r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D370342-02DA-4859-B98B-0A3F78EACAEE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "65F6CFE8-5071-4419-9E30-1748692EE236",
                     versionEndExcluding: "9.1.0.122\\(c09e7r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB72B761-E0C1-4728-AB85-2A833420DEB8",
                     versionEndExcluding: "9.1.0.137\\(c33e8r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1364E52C-AD75-4778-AC90-E9ADC243B507",
                     versionEndExcluding: "9.1.0.137\\(c530e8r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A33ED9A6-9818-4EE9-A22F-750B852789C1",
                     versionEndExcluding: "9.1.0.158\\(c432e8r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E19C3F4-998D-43C1-B371-CFECBAB5AF31",
                     versionEndExcluding: "9.1.0.165\\(c10e8r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F291A39-6603-4619-BB18-B1A4C48F945A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "10C0DC76-8986-449D-B098-2EB7CA4228BB",
                     versionEndExcluding: "9.1.0.150\\(c432e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88CD5EEC-DA40-4B35-A2CD-6F48147F0810",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A950FF3A-8934-4788-AAF1-28C139EFEA63",
                     versionEndExcluding: "9.1.0.149\\(c675e8r2p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55571AAC-B8B2-48D0-8486-BB2992A39568",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A12E685-F91D-4C04-82C5-61A9BA317A42",
                     versionEndExcluding: "9.1.0.154\\(c185e2r5p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDADE368-D2EB-4DA9-A32E-9DE30BEE927D",
                     versionEndExcluding: "9.1.0.154\\(c432e2r5p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E341C6A4-BA77-4002-BC06-475ABFFEBFFB",
                     versionEndExcluding: "9.1.0.154\\(c636e2r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "81C06F1A-9DAF-41EC-93D1-F61CD36D3471",
                     versionEndExcluding: "9.1.0.155\\(c10e2r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E688C7-4152-446F-AFBD-710622835A48",
                     versionEndExcluding: "9.1.0.170\\(c185e2r5p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC4403D2-BAA4-4392-A453-5F1B28E8FA4F",
                     versionEndExcluding: "9.1.0.170\\(c636e2r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2CF3193-1EB6-4792-BD23-3C1C243A3E3B",
                     versionEndExcluding: "9.1.0.171\\(c10e2r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7FCD8C1-C635-4806-839E-14DC0CB3B4E2",
                     versionEndExcluding: "9.1.0.172\\(c432e2r5p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
      },
      {
         lang: "es",
         value: "La especificación de Bluetooth BR/EDR  incluyendo versión 5.1, permite una longitud de clave de cifrado suficientemente baja y no impide que un atacante influya en la negociación de longitud de clave. Esto permite ataques prácticos de fuerza bruta (también se conoce como \"KNOB\") que pueden descifrar el tráfico e inyectar texto cifrado arbitrario sin que la víctima se dé cuenta.",
      },
   ],
   id: "CVE-2019-9506",
   lastModified: "2024-11-21T04:51:45.113",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "ADJACENT_NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.8,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 6.5,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "LOW",
               baseScore: 7.6,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 4.7,
            source: "cret@cert.org",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "ADJACENT_NETWORK",
               availabilityImpact: "NONE",
               baseScore: 8.1,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.2,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-08-14T17:15:11.597",
   references: [
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/11",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/13",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/14",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/15",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:2975",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3055",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3076",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3089",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3165",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3187",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3217",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3218",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3220",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3231",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3309",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3517",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0204",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4115-1/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4118-1/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4147-1/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/918987/",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/11",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/13",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/14",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Aug/15",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:2975",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3055",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3076",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3089",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3165",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3187",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3217",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3218",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3220",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3231",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3309",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2019:3517",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://access.redhat.com/errata/RHSA-2020:0204",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4115-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4118-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4147-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/918987/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-310",
            },
         ],
         source: "cret@cert.org",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-327",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-03-10 20:15
Modified
2024-11-21 04:52
Summary
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
Impacted products
Vendor Product Version
google android -
huawei berkeley-l09_firmware *
huawei berkeley-l09 -
huawei columbia-al10b_firmware *
huawei columbia-al10b -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei columbia-tl00b_firmware *
huawei columbia-tl00b -
huawei columbia-tl00d_firmware *
huawei columbia-tl00d -
huawei cornell-al00a_firmware *
huawei cornell-al00a -
huawei cornell-tl10b_firmware *
huawei cornell-tl10b -
huawei dura-al00a_firmware *
huawei dura-al00a -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei y6_2019_firmware *
huawei y6_2019 -
huawei nova_3_firmware *
huawei nova_3 -
huawei nova_4_firmware *
huawei nova_4 -
huawei honor_8a_firmware *
huawei honor_8a -
huawei honor_view_20_firmware *
huawei honor_view_20 -
huawei jakarta-al00a_firmware *
huawei jakarta-al00a -
huawei katyusha-al00a_firmware *
huawei katyusha-al00a -
huawei katyusha-al10a_firmware *
huawei katyusha-al10a -
huawei madrid-al00a_firmware *
huawei madrid-al00a -
huawei paris-l29b_firmware *
huawei paris-l29b -
huawei princeton-al10b_firmware *
huawei princeton-al10b -
huawei sydney-al00_firmware *
huawei sydney-al00 -
huawei sydney-tl00_firmware *
huawei sydney-tl00 -
huawei sydneym-al00_firmware *
huawei sydneym-al00 -
huawei tony-al00b_firmware *
huawei tony-al00b -
huawei tony-tl00b_firmware *
huawei tony-tl00b -
huawei yale-al00a_firmware *
huawei yale-al00a -
huawei yale-l21a_firmware *
huawei yale-l21a -
huawei yalep-al10b_firmware *
huawei yalep-al10b -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei honor_20_pro_firmware *
huawei honor_20_pro -
huawei y6_2019_firmware *
huawei y6_2019 -
huawei y6_2019_firmware *
huawei y6_2019 -
huawei y6_2019_firmware *
huawei y6_2019 -
huawei honor_8a_firmware *
huawei honor_8a -
huawei honor_8a_firmware *
huawei honor_8a -
huawei honor_8a_firmware *
huawei honor_8a -
huawei honor_view_20_firmware *
huawei honor_view_20 -
huawei honor_view_20_firmware *
huawei honor_view_20 -



{
   cisaActionDue: "2022-05-03",
   cisaExploitAdd: "2021-11-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCEFDA14-C332-4604-85E5-332231B8853B",
                     versionEndExcluding: "10.0.0.177\\(c10e3r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "046C3C00-63A5-4CA9-9BFA-DEDF7D3A1D90",
                     versionEndExcluding: "10.0.0.178\\(c00e178r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2F63CA2F-45B8-4DD3-81AE-8359929AE50B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3135BBC7-2A18-47E9-9041-16077B1102A2",
                     versionEndExcluding: "10.0.0.177\\(c10e4r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "42E8C828-0C05-4CD7-BC72-98AC05C6DDE5",
                     versionEndExcluding: "10.0.0.178\\(c01e178r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "02334509-2493-419F-8FF5-E1F1076FB930",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "142A8425-13E2-4215-80B6-80921BA7B3C1",
                     versionEndExcluding: "10.0.0.178\\(c01e178r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BE1BB06-0403-4F46-AF76-DAD85D538907",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BD55A2A-8A54-4E48-B352-F7042BBF2C3F",
                     versionEndExcluding: "9.1.0.340\\(c00e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB5193B7-6F3F-4249-BB74-62480893CAB2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8DF2BE8-65FB-43DF-9FCD-E79C7DF0BB16",
                     versionEndExcluding: "9.1.0.340\\(c01e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73F60E9A-0ACB-4E44-ADFB-771C695FCF08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4",
                     versionEndExcluding: "1.0.0.190\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC591FA6-55E1-4628-AE43-CD1E2A4980E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15E9683F-8037-418C-90AB-7ABDB6BE13BD",
                     versionEndExcluding: "10.0.0.194\\(c636e3r3p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD39CEB3-C282-4988-A642-58E41C8DDDED",
                     versionEndExcluding: "9.1.0.290\\(c185e5r4p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E7053C3-4EB2-438E-9544-41ACF7A91057",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F27CB3A-F773-48FB-9CAE-20FC93273D21",
                     versionEndExcluding: "9.1.0.338\\(c00e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF68FFB0-01F8-4937-8BF4-36866F02E9A8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE1E4E8B-0AD9-498D-81F3-13211D9E683E",
                     versionEndExcluding: "10.0.0.160\\(c01e32r2p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07D1E240-F1DE-4FC0-84B7-873978A9A6B3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2128BDE5-AE3B-427E-8A25-F3065850206A",
                     versionEndExcluding: "9.1.0.291\\(c185e3r4p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "43BBA181-3DDA-4BE0-A21E-FCBE2FB39BAA",
                     versionEndExcluding: "10.0.0.198\\(c432e10r3p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B12799AD-C7F4-4F02-9BF6-93EB2BE69744",
                     versionEndExcluding: "9.1.0.251\\(c00e106r2p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB6F70FE-53A7-439A-8423-9BA3CB6A9510",
                     versionEndExcluding: "9.1.0.146\\(c00e131r2p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E3A00A-6EB8-4E04-B1BC-E7663C9C1EA3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "58FFB71A-0A0A-458E-A035-A353BB4A8894",
                     versionEndExcluding: "9.1.0.160\\(c00e150r1p7\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBF2ED42-43B8-4586-913A-62607E458BDC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FDE93D9-3B6C-4630-AFEF-77184BA570C5",
                     versionEndExcluding: "9.1.0.261\\(c00e120r4p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE8B2A97-DA47-40C8-8DB5-1AE1A89559A5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D85AB1CB-E1A8-49C2-A49E-DB0624ACE41B",
                     versionEndExcluding: "9.1.0.380\\(c636e1r1p3t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "143485B2-5216-4190-8306-63D12362F6AF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AC6D9E1-DC06-4CB7-9E0D-8BABCB5F331F",
                     versionEndExcluding: "10.0.0.194\\(c00e61r4p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "96856831-31DE-4853-B1B9-9B666BB861F1",
                     versionEndExcluding: "9.1.0.237\\(c00e80r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66A35E71-4D6A-494D-882B-987CE16E3467",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC6C2354-5777-40FE-99A4-51AF4233B139",
                     versionEndExcluding: "9.1.0.237\\(c01e80r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "905B9A20-E643-4E82-B918-6067398A0E25",
                     versionEndExcluding: "10.0.0.159\\(c00e64r1p5\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "63B310F0-9165-48E3-9609-6CA49D6E10C5",
                     versionEndExcluding: "10.1.0.137\\(c00e137r2p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E14B978-2A3C-4F55-8E3A-BA41AB137C33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D4E2493-F5E5-4DB3-BD0F-87A8B07A3BBD",
                     versionEndExcluding: "10.0.0.196\\(c01e65r2p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0993FFB0-E860-437B-94AF-5D80D7598F5B",
                     versionEndExcluding: "10.0.0.196\\(c00e62r8p12\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "562D05D2-CC9E-4973-9E8D-B40C0ED6C721",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8C81625-2725-4B62-9DB5-7FC9B822A51A",
                     versionEndExcluding: "10.0.0.202\\(c10e3r3p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BD65BBE-8AAA-4B67-A9B6-A58A4DD0CF74",
                     versionEndExcluding: "10.0.0.194\\(c00e62r8p12\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D81385-913B-4A38-A712-41CAE7B78DF4",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBCD3C2-25B7-431D-8277-E25616008891",
                     versionEndExcluding: "10.0.0.177\\(c432e3r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59A1E3C0-5364-4C4D-BB27-69941AAE68C0",
                     versionEndExcluding: "10.0.0.202\\(c10e3r3p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E2BCA7E-E555-45D1-807A-F53682B0C383",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "25442A0C-4E81-4417-BC5E-8F9CC71E4AED",
                     versionEndExcluding: "9.1.0.290\\(c431e1r1p8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E7053C3-4EB2-438E-9544-41ACF7A91057",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "19E562E7-C11D-4D00-B288-B287EC7BF250",
                     versionEndExcluding: "9.1.0.290\\(c605e6r1p6\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E7053C3-4EB2-438E-9544-41ACF7A91057",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "671F4E52-9877-40BA-AA8A-377C9DD7431A",
                     versionEndExcluding: "9.1.0.295\\(c431e5r2p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E7053C3-4EB2-438E-9544-41ACF7A91057",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2224974-8DCD-410A-A072-2D52B26BB56D",
                     versionEndExcluding: "9.1.0.291\\(c432e5r2p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A71A7A6-2220-45F0-B9E0-560632C36EE2",
                     versionEndExcluding: "9.1.0.291\\(c636e4r4p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1D1A153-274B-40A2-B9A8-F5E8B83258A1",
                     versionEndExcluding: "9.1.0.297\\(c605e4r4p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "511131DF-79C4-41A5-A0D3-015A832B2C35",
                     versionEndExcluding: "10.0.0.200\\(c185e3r3p3\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "24DC8C7E-C586-4B6C-99A9-808202A7BD55",
                     versionEndExcluding: "10.0.0.201\\(c10e5r4p3\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754",
      },
      {
         lang: "es",
         value: "En los manejadores de ioctl del controlador Mediatek de Command Queue, hay una posible escritura fuera de límites debido a un saneamiento de entrada insuficiente y a una falta de restricciones de SELinux. Esto podría conllevar a una escalada de privilegios local  sin ser necesarios privilegios de ejecución adicionales. No es requerida una interacción del usuario para su explotación. Producto: Android, Versiones: kernel de Android, ID de Android: A-147882143, Referencias: M-ALPS04356754",
      },
   ],
   id: "CVE-2020-0069",
   lastModified: "2024-11-21T04:52:50.800",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-03-10T20:15:21.947",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
      },
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2020-03-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2020-03-01",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-787",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-201908-1958
Vulnerability from variot

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing. Bluetooth BR/EDR is a Bluetooth BR/EDR (Basic Rate/Enhanced Data Rate) standard. An encryption issue vulnerability exists in Bluetooth BR/EDR 5.1 and earlier versions. The vulnerability stems from incorrect use of relevant cryptographic algorithms by network systems or products, resulting in improperly encrypted content, weak encryption, and storing sensitive information in plain text. A weakness in the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol core specification exposes a vulnerability that could allow for an unauthenticated, adjacent malicious user to perform a man-in-the-middle attack on an encrypted Bluetooth connection. The attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked. The issue could allow the malicious user to reduce the entropy of the negotiated session key that is used to secure a Bluetooth connection between a paired device and a host device. An attacker who can successfully inject a malicious message into a Bluetooth connection during session negotiation or renegotiation could cause the strength of the session key to be susceptible to brute force attack. This advisory will be updated as additional information becomes available. There are no workarounds that address this vulnerability.

This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth. 7) - aarch64, noarch, ppc64le

Bug Fix(es):

  • kernel modules pkey and paes_s390 are not available (BZ#1719192)

  • pkey: Indicate old mkvp only if old and curr. mkvp are different (BZ#1720621)

  • System dropped into Mon running softboots Exception: 501 (Hardware Interrupt) at c00000000000a814 replay_interrupt_return+0x0/0x4 (ipmi) (BZ#1737563)

  • kernel: jump label transformation performance (BZ#1739143)

  • Backport i40e MDD detection removal for PFs (BZ#1747618)

  • 7.5) - ppc64, ppc64le, x86_64

Bug Fix(es):

  • TCP packets are segmented when sent to the VLAN device when coming from VXLAN dev. (BZ#1732810)

  • skb head copy occurs when sending traffic over OVS managed VXLAN tunnel (BZ#1733896)

  • [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734306)

  • use "make -jN" for modules_install (BZ#1735082)

  • Backport TCP follow-up for small buffers (BZ#1739128)

  • [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree (BZ#1740176)

  • RHEL7.6 - powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM) (BZ#1745437)

  • RHEL7.6 - powerpc/pseries: Fix unitialized timer reset on migration / powerpc/pseries/mobility: Extend start/stop topology update scope (LPM) (BZ#1745439)

  • RHEL7.5 - ISST-LTE:PVM:Zeppelin :LPM: Failure logs and stack trace seen during LPM (POWER9/P9) (BZ#1745447)

Bug Fix(es):

  • port show-kabi to python3 (BZ#1806924)

  • 7.6) - ppc64le, x86_64

  • Description:

This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied. 8) - aarch64, noarch, ppc64le, s390x, x86_64

  1. 7.3) - noarch, x86_64

Bug Fix(es):

  • kernel build: parallelize redhat/mod-sign.sh (BZ#1755326)

  • -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:3055-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3055 Issue date: 2019-10-15 CVE Names: CVE-2018-20856 CVE-2019-3846 CVE-2019-9506 CVE-2019-10126 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856)

  • kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846)

  • hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)

  • kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fixes:

  • gfs2: Fix iomap write page reclaim deadlock (BZ#1737373)

  • [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree (BZ#1740178)

  • high update_cfs_rq_blocked_load contention (BZ#1740180)

  • [Hyper-V][RHEL 7] kdump fails to start on a Hyper-V guest of Windows Server 2019. (BZ#1740188)

  • kvm: backport cpuidle-haltpoll driver (BZ#1740192)

  • Growing unreclaimable slab memory (BZ#1741920)

  • [bnx2x] ping failed from pf to vf which has been attached to vm (BZ#1741926)

  • [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with > 240 vCPUs (i.e., when in x2APIC mode) (BZ#1743324)

  • Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid (BZ#1744442)

  • RHEL 7.7 Beta - Hit error when trying to run nvme connect with IPv6 address (BZ#1744443)

  • RHEL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system (BZ#1744444)

  • NFSv4.0 client sending a double CLOSE (leading to EIO application failure) (BZ#1744946)

  • [Azure] CRI-RDOS | [RHEL 7.8] Live migration only takes 10 seconds, but the VM was unavailable for 2 hours (BZ#1748239)

  • NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments (BZ#1749290)

  • [Inspur] RHEL7.6 ASPEED graphic card display issue (BZ#1749296)

  • Allows macvlan to operated correctly over the active-backup mode to support bonding events. (BZ#1751579)

  • [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group (BZ#1752421)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c 1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) 1738705 - CVE-2018-20856 kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: kernel-3.10.0-1062.4.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1062.4.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm perf-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: kernel-3.10.0-1062.4.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1062.4.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm perf-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: kernel-3.10.0-1062.4.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm

ppc64: bpftool-3.10.0-1062.4.1.el7.ppc64.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-3.10.0-1062.4.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debug-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1062.4.1.el7.ppc64.rpm kernel-devel-3.10.0-1062.4.1.el7.ppc64.rpm kernel-headers-3.10.0-1062.4.1.el7.ppc64.rpm kernel-tools-3.10.0-1062.4.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.ppc64.rpm perf-3.10.0-1062.4.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm python-perf-3.10.0-1062.4.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm

ppc64le: bpftool-3.10.0-1062.4.1.el7.ppc64le.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debug-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-devel-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-headers-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-tools-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.ppc64le.rpm perf-3.10.0-1062.4.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm python-perf-3.10.0-1062.4.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm

s390x: bpftool-3.10.0-1062.4.1.el7.s390x.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm kernel-3.10.0-1062.4.1.el7.s390x.rpm kernel-debug-3.10.0-1062.4.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.s390x.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-1062.4.1.el7.s390x.rpm kernel-devel-3.10.0-1062.4.1.el7.s390x.rpm kernel-headers-3.10.0-1062.4.1.el7.s390x.rpm kernel-kdump-3.10.0-1062.4.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-1062.4.1.el7.s390x.rpm perf-3.10.0-1062.4.1.el7.s390x.rpm perf-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm python-perf-3.10.0-1062.4.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm

x86_64: bpftool-3.10.0-1062.4.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm perf-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: bpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-1062.4.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.ppc64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm

ppc64le: bpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm

x86_64: bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: kernel-3.10.0-1062.4.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm

x86_64: bpftool-3.10.0-1062.4.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm kernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm perf-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: bpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2018-20856 https://access.redhat.com/security/cve/CVE-2019-3846 https://access.redhat.com/security/cve/CVE-2019-9506 https://access.redhat.com/security/cve/CVE-2019-10126 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBXaYG69zjgjWX9erEAQjA1Q/7Bte0lgWfI6xE9bw9FqrE7ZFw3Jq5bqV1 8PYYAZBFCLUHsC1HS33jiTGGaS5xbqR4yrtNCnZHLhsZU6w9avm0zDFW2CEzAwRC Uri5R30mCVtc2p3jsHupNKrKhzzkmKjz2J5gYn+ubX9Ok7ScxZZ8ucF9kJcSx7LL qswocd0lWkbjy/2MY0t6MCMnvoNvgOB1XEmQE5a9CHrHtKe9kEJcWJUht6vXqhZ4 SJYkMLDIsDYOXFsWBwZnKT0BVXNurS9+g7b7MX4ZaQATN5MD9x7jP7FYTIp8lhyJ NKOqa8/D5eFGKF3YlgySgqXZ22XT1MasENDJ7OS62lRQd+/eeznyK0CUOAtILLvH 1GTfXgz8nvMynX+ZKkiZv5+tEFCWFNKkHudYuzoirFa+p29l0YWW6SjfPN+c3NnE 9DLfZhqYuX2tcx3O8khxjS/okRh5mBFQvzXlWqyPmgqsbjP0L5R2YoPNMzzGB3OQ FA/QgjD8AD9Tn8+rZM+VeoWVYTwPT8OMv1wMEqOeJLIxR8/DiY42YEQiNBU2na4W AYajLwK6d3Ey+DV+/5YwjWWQOyyTxP9Q8F0xb61HdQmq1dILZJgFBmVR5ilxlpoJ sHiYCTKF/M8DbDGSWwZkD69ZPtBWPGvTI0XkgTIfhcTeF2BRL2UZkszrM72QjGqH OQh6hA3MyvA=zvD0 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .

Bug Fix(es):

  • kernel-rt: update to the RHEL7.7.z batch#2 source tree (BZ#1748570)

  • -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3

watchOS 5.3 addresses the following:

Bluetooth Available for: Apple Watch Series 1 and later Impact: An attacker in a privileged network position may be able to intercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB) Description: An input validation issue existed in Bluetooth. This issue was addressed with improved input validation. CVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole Tippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of University of Oxford, England Entry added August 13, 2019

Core Data Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero

Core Data Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-8647: Samuel Groß and Natalie Silvanovich of Google Project Zero

Core Data Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project Zero

Digital Touch Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8624: Natalie Silvanovich of Google Project Zero

FaceTime Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu

Foundation Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project Zero

Heimdal Available for: Apple Watch Series 1 and later Impact: An issue existed in Samba that may allow attackers to perform unauthorized actions by intercepting communications between services Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team and Catalyst

libxslt Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to view sensitive information Description: A stack overflow was addressed with improved input validation. CVE-2019-13118: found by OSS-Fuzz

Messages Available for: Apple Watch Series 1 and later Impact: Users removed from an iMessage conversation may still be able to alter state Description: This issue was addressed with improved checks. CVE-2019-8659: Ryan Kontos (@ryanjkontos), Will Christensen of University of Oregon

Messages Available for: Apple Watch Series 1 and later Impact: A remote attacker may cause an unexpected application termination Description: A denial of service issue was addressed with improved validation. CVE-2019-8665: Michael Hernandez of XYZ Marketing

Quick Look Available for: Apple Watch Series 1 and later Impact: An attacker may be able to trigger a use-after-free in an application deserializing an untrusted NSDictionary Description: This issue was addressed with improved checks. CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project Zero

Siri Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8646: Natalie Silvanovich of Google Project Zero

UIFoundation Available for: Apple Watch Series 1 and later Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative

Wallet Available for: Apple Watch Series 1 and later Impact: A user may inadvertently complete an in-app purchase while on the lock screen Description: The issue was addressed with improved UI handling. CVE-2019-8682: Jeff Braswell (JeffBraswell.com)

WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved state management. CVE-2019-8658: akayn working with Trend Micro's Zero Day Initiative

WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-8669: akayn working with Trend Micro's Zero Day Initiative CVE-2019-8672: Samuel Groß of Google Project Zero CVE-2019-8676: Soyeon Park and Wen Xu of SSLab at Georgia Tech CVE-2019-8683: lokihardt of Google Project Zero CVE-2019-8684: lokihardt of Google Project Zero CVE-2019-8685: akayn, Dongzhuo Zhao working with ADLab of Venustech, Ken Wong (@wwkenwong) of VXRL, Anthony Lai (@darkfloyd1014) of VXRL, and Eric Lung (@Khlung1) of VXRL CVE-2019-8688: Insu Yun of SSLab at Georgia Tech CVE-2019-8689: lokihardt of Google Project Zero

Additional recognition

MobileInstallation We would like to acknowledge Dany Lisiansky (@DanyL931) for their assistance.

Installation note:

Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641

To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About".

Alternatively, on your watch, select "My Watch > General > About"

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201908-1958",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "sydneym-al00",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.170\\(c636e2r3p1\\)",
         },
         {
            model: "florida-l22",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.150\\(c636e6r1p5t8\\)",
         },
         {
            model: "atomu-l33",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.147\\(c605custc605d1\\)",
         },
         {
            model: "yale-al50a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.171\\(c10e2r3p1\\)",
         },
         {
            model: "honor 20",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.143\\(c675e8r2p1\\)",
         },
         {
            model: "lelandp-al10b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "paris-l21b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "paris-al00ic",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "p30 pro",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.2",
         },
         {
            model: "hima-l29c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nova lite 3",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "yale-l21a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "columbia-l29d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c461e3r1p11t8\\)",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "cornell-l29a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.336\\(c636e2r1p12t8\\)",
         },
         {
            model: "sydney-l22",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux for real time for nfv",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "lelandp-al10d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "berkeley-tl10",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c01e333r1p1t8\\)",
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.154\\(c432e2r5p1\\)",
         },
         {
            model: "ever-l29b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.338\\(c185e3r3p1\\)",
         },
         {
            model: "berkeley-l09",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.332\\(c432e5r1p13t8\\)",
         },
         {
            model: "enterprise linux for real time for nfv eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.4",
         },
         {
            model: "cornell-tl10b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c01e333r1p1t8\\)",
         },
         {
            model: "charlotte-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.328\\(c782e10r1p9t8\\)",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "sydney-l22br",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.155\\(c10e2r3p1\\)",
         },
         {
            model: "columbia-l29d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c636e3r1p13t8\\)",
         },
         {
            model: "figo-l31",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.158\\(c432e8r1p5t8\\)",
         },
         {
            model: "yale-tl00b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.04",
         },
         {
            model: "atomu-l41",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.153\\(c461custc461d1\\)",
         },
         {
            model: "sydneym-l23",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "figo-l31",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.122\\(c09e7r1p5t8\\)",
         },
         {
            model: "florida-l23",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.154\\(c605e7r1p2t8\\)",
         },
         {
            model: "y7 2019",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "jakarta-al00a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lelandp-l22a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "charlotte-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.328\\(c432e5r1p9t8\\)",
         },
         {
            model: "ares-al10d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.160\\(c00e160r2p5t8\\)",
         },
         {
            model: "emily-l29c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "8.1.0.156\\(c605\\)",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "ares-tl00c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.165\\(c01e165r2p5t8\\)",
         },
         {
            model: "imanager neteco 6000",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "florida-l21",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.150\\(c432e6r1p5t8\\)",
         },
         {
            model: "harry-al00c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.1",
         },
         {
            model: "barca-al00",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.366\\(c00\\)",
         },
         {
            model: "harry-tl00c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nova 3",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "madrid-tl00a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "princeton-al10d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux for real time for nfv",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "imanager neteco",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bla-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.306\\(c636e2r1p13t8\\)",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.2",
         },
         {
            model: "watchos",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "5.3",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "leland-tl10c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.170\\(c185e2r5p1\\)",
         },
         {
            model: "bla-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.306\\(c185e2r1p13t8\\)",
         },
         {
            model: "potter-al00c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.12.6",
         },
         {
            model: "cornell-al10ind",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.363\\(c675e2r1p9t8\\)",
         },
         {
            model: "columbia-l29d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c10e5r1p14t8\\)",
         },
         {
            model: "atomu-l42",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.155\\(c636custc636d1\\)",
         },
         {
            model: "y6 2019",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "nova 5i pro",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dura-tl00a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "1.0.0.176\\(c01\\)",
         },
         {
            model: "columbia-al10b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c00e333r1p1t8\\)",
         },
         {
            model: "mrg realtime",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "figo-l23",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.160\\(c605e6r1p5t8\\)",
         },
         {
            model: "asoka-al00ax",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.1.181\\(c00e48r6p1\\)",
         },
         {
            model: "yale-l61c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "laya-al00ep",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bla-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.300\\(c605e2r1p12t8\\)",
         },
         {
            model: "johnson-tl00d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "figo-tl10b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.130\\(c01e115r2p8t8\\)",
         },
         {
            model: "nova 4",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "potter-al10a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "leland-tl10b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.1",
         },
         {
            model: "p smart",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dura-al00a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "1.0.0.182\\(c00\\)",
         },
         {
            model: "tvos",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "12.4",
         },
         {
            model: "iphone os",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "12.4",
         },
         {
            model: "android",
            scope: "eq",
            trust: 1,
            vendor: "google",
            version: null,
         },
         {
            model: "figo-l31",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.122d\\(c652\\)",
         },
         {
            model: "columbia-l29d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.351\\(c432e5r1p13t8\\)",
         },
         {
            model: "enterprise linux for real time eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.4",
         },
         {
            model: "leland-l32c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "princeton-tl10c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lelandp-l22c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "leland-l31a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "columbia-tl00d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.1.0.186\\(c01gt\\)",
         },
         {
            model: "berkeley-l09",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c636e4r1p13t8\\)",
         },
         {
            model: "leland-l42c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "paris-l21meb",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cairogo-l22",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "cairogo-l22c461b153",
         },
         {
            model: "cornell-l29a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.347\\(c432e1r1p9t8\\)",
         },
         {
            model: "y6 pro 2019",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "emily-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.325\\(c636e7r1p13t8\\)",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.4",
         },
         {
            model: "virtualization host eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.2",
         },
         {
            model: "enterprise linux for real time for nfv eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.2",
         },
         {
            model: "florida-tl10b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.128\\(c01e112r1p6t8\\)",
         },
         {
            model: "sydneym-l21",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "sydney-l21br",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "harry-al10b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cornell-l29a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.341\\(c185e1r1p9t8\\)",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "y9 2019",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "florida-l21",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.150\\(c185e6r1p5t8\\)",
         },
         {
            model: "columbia-al10i",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.335\\(c675e8r1p9t8\\)",
         },
         {
            model: "emily-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.325\\(c185e2r1p12t8\\)",
         },
         {
            model: "sydneym-l22",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "princeton-al10b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "figo-l31",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.137\\(c530e8r1p5t8\\)",
         },
         {
            model: "p20",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "leland-l42a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "berkeley-al20",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c00e333r2p1t8\\)",
         },
         {
            model: "honor 10 lite",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sydney-tl00",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "p smart 2019",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "bla-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.307\\(c635e4r1p13t8\\)",
         },
         {
            model: "bla-al00b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.329\\(c786e320r2p1t8\\)",
         },
         {
            model: "honor 8a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "sydney-al00",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "y5 lite",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "emily-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.326\\(c635e2r1p11t8\\)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "8.0",
         },
         {
            model: "paris-l29b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "neo-al00d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "katyusha-al00a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "bla-tl00b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.329\\(c01e320r1p1t8\\)",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.4",
         },
         {
            model: "charlotte-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.325\\(c636e2r1p12t8\\)",
         },
         {
            model: "enterprise linux aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "tony-tl00b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cornell-al00a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c00e333r1p1t8\\)",
         },
         {
            model: "tony-al00b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "johnson-tl00f",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "p20 pro",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor view 10",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "y5 2018",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor view 20",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cornell-l29a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.342\\(c461e1r1p9t8\\)",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.13.6",
         },
         {
            model: "berkeley-l09",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c10e3r1p14t8\\)",
         },
         {
            model: "sydneym-l03",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.154\\(c636e2r3p1\\)",
         },
         {
            model: "bla-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.306\\(c432e4r1p11t8\\)",
         },
         {
            model: "figo-l31",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.137\\(c33e8r1p5t8\\)",
         },
         {
            model: "yale-al00a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux for real time",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "sydneym-l01",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "dubai-al00a",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.2.0.190\\(c00r2p2\\)",
         },
         {
            model: "mate 20 x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.154\\(c185e2r5p1\\)",
         },
         {
            model: "leland-l21a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "alp-al00b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.333\\(c00e333r2p1t8\\)",
         },
         {
            model: "enterprise linux for real time eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.2",
         },
         {
            model: "y6 prime 2018",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "yalep-al10b",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "cornell-al00ind",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "8.2.0.141\\(c675custc675d1gt\\)",
         },
         {
            model: "lelandp-l22d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "charlotte-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.311\\(c605e2r1p11t8\\)",
         },
         {
            model: "leland-l32a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "emily-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.328\\(c432e7r1p11t8\\)",
         },
         {
            model: "p30",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ares-al00b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.160\\(c00e160r2p5t8\\)",
         },
         {
            model: "columbia-l29d",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.350\\(c185e3r1p12t8\\)",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.2",
         },
         {
            model: "cornell-al00i",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.363\\(c675e3r1p9t8\\)",
         },
         {
            model: "honor 20",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.149\\(c675e8r2p1\\)",
         },
         {
            model: "honor 20 pro",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.172\\(c432e2r5p1\\)",
         },
         {
            model: "london-al40ind",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "honor 8x",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8.4",
         },
         {
            model: "sydney-l21",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "charlotte-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.325\\(c185e4r1p11t8\\)",
         },
         {
            model: "lelandp-al00c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "madrid-al00a",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "figo-l31",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.165\\(c10e8r1p5t8\\)",
         },
         {
            model: "florida-al20b",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.128\\(c00e112r1p6t8\\)",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.14.5",
         },
         {
            model: "mate 20 pro",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "nova 5",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "19.04",
         },
         {
            model: "mate 20",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: null,
         },
         {
            model: "enterprise linux for real time",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "emily-l29c",
            scope: "lt",
            trust: 1,
            vendor: "huawei",
            version: "9.1.0.311\\(c461e2r1p11t8\\)",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:blackberry:blackberry:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.14.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:watchos:5.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:iphone_os:12.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.13.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:tvos:12.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:redhat:virtualization_host_eus:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_aus:7.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_eus:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_eus:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.160\\(c00e160r2p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.160\\(c00e160r2p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ares-tl00c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.165\\(c01e165r2p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ares-tl00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:asoka-al00ax_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.1.181\\(c00e48r6p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:asoka-al00ax:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:atomu-l33_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.0.0.147\\(c605custc605d1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:atomu-l33:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:atomu-l41_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.0.0.153\\(c461custc461d1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:atomu-l41:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:atomu-l42_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.0.0.155\\(c636custc636d1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:atomu-l42:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.329\\(c786e320r2p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.300\\(c605e2r1p12t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.329\\(c01e320r1p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.0.0.366\\(c00\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:berkeley-al20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.332\\(c432e5r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cairogo-l22_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "cairogo-l22c461b153",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cairogo-l22:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.311\\(c605e2r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-al10i_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.335\\(c675e8r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-al10i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c10e5r1p14t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.1.0.186\\(c01gt\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-al00i_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.363\\(c675e3r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-al00i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-al00ind_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.2.0.141\\(c675custc675d1gt\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-al00ind:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-al10ind_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.363\\(c675e2r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-al10ind:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.336\\(c636e2r1p12t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dubai-al00a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "8.2.0.190\\(c00r2p2\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dubai-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.0.182\\(c00\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:dura-tl00a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.0.0.176\\(c01\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:dura-tl00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:8.1.0.156\\(c605\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.338\\(c185e3r3p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l23_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.160\\(c605e6r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l23:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:8.0.0.122d\\(c652\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-tl10b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.130\\(c01e115r2p8t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-tl10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.128\\(c00e112r1p6t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.150\\(c185e6r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.150\\(c636e6r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-l23_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-l23:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.128\\(c01e112r1p6t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.143\\(c675e8r2p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.154\\(c185e2r5p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:mate_20_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:mate_20_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:mate_20_x_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p_smart_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p_smart_2019_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p20_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p20_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p30_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:p30_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y5_2018_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y5_2018:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y5_lite_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y5_lite:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y6_2019_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y6_prime_2018_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y6_prime_2018:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y6_pro_2019_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y7_2019_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y7_2019:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:y9_2019_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nova_3_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nova_4_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nova_5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nova_5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nova_5i_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nova_5i_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:nova_lite_3_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:harry-al00c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:harry-al00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:harry-al10b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:harry-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:harry-tl00c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:harry-tl00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:hima-l29c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_10_lite_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_8a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_8x_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_view_10_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_view_10:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:jakarta-al00a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:johnson-tl00d_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:johnson-tl00f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:johnson-tl00f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:katyusha-al00a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:laya-al00ep_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l21a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l31a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l31a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l32a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l32c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l32c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l42a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l42a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-l42c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-l42c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-tl10b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:leland-tl10c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-al00c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-al10b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-al10d_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-al10d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22d_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:london-al40ind_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:london-al40ind:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:madrid-al00a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:madrid-tl00a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:madrid-tl00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:neo-al00d_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:paris-al00ic_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:paris-al00ic:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:paris-l21b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:paris-l21b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:paris-l21meb_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:paris-l21meb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:paris-l29b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:potter-al00c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:potter-al00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:potter-al10a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:potter-al10a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:princeton-al10b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:princeton-al10d_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:princeton-tl10c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:princeton-tl10c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-al00_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-l21_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-l21br_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-l21br:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-l22_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-l22:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-l22br_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-l22br:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydney-tl00_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-al00_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-l03_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-l03:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-l21_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:sydneym-l23_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:sydneym-l23:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tony-al00b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:tony-tl00b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yale-al00a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yale-al50a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yale-al50a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yale-l61c_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yale-l61c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yale-tl00b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:yalep-al10b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:imanager_neteco_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:imanager_neteco:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:imanager_neteco_6000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:imanager_neteco_6000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.306\\(c185e2r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.306\\(c432e4r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.306\\(c636e2r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.307\\(c635e4r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c10e3r1p14t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c636e4r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.325\\(c185e4r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.325\\(c636e2r1p12t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.328\\(c432e5r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.328\\(c782e10r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c185e3r1p12t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c461e3r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.350\\(c636e3r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.341\\(c185e1r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.342\\(c461e1r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.347\\(c432e1r1p9t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.311\\(c461e2r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.325\\(c185e2r1p12t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.325\\(c636e7r1p13t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.326\\(c635e2r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.328\\(c432e7r1p11t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.122\\(c09e7r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.137\\(c33e8r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.137\\(c530e8r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.158\\(c432e8r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:figo-l31_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.165\\(c10e8r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:figo-l31:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.150\\(c432e6r1p5t8\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.149\\(c675e8r2p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.154\\(c185e2r5p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.154\\(c432e2r5p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.154\\(c636e2r3p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.155\\(c10e2r3p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.170\\(c185e2r5p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.170\\(c636e2r3p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.171\\(c10e2r3p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "9.1.0.172\\(c432e2r5p1\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            db: "PACKETSTORM",
            id: "154879",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2019-9506",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "ADJACENT_NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.5,
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "ADJACENT_NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.5,
                  id: "VHN-160941",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:A/AC:L/AU:N/C:P/I:P/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "ADJACENT_NETWORK",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 4.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 6.5,
                  id: "CVE-2019-9506",
                  impactScore: 4.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 0.1,
                  userInteractionRequired: null,
                  vectorString: "AV:A/AC:L/Au:N/C:P/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 8.1,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.8,
                  impactScore: 5.2,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  author: "cret@cert.org",
                  availabilityImpact: "LOW",
                  baseScore: 7.6,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.8,
                  impactScore: 4.7,
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2019-9506",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "cret@cert.org",
                  id: "CVE-2019-9506",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201908-864",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-160941",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2019-9506",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing. Bluetooth BR/EDR is a Bluetooth BR/EDR (Basic Rate/Enhanced Data Rate) standard. An encryption issue vulnerability exists in Bluetooth BR/EDR 5.1 and earlier versions. The vulnerability stems from incorrect use of relevant cryptographic algorithms by network systems or products, resulting in improperly encrypted content, weak encryption, and storing sensitive information in plain text. A weakness in the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol core specification exposes a vulnerability that could allow for an unauthenticated, adjacent malicious user to perform a man-in-the-middle attack on an encrypted Bluetooth connection. The attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked. \nThe issue could allow the malicious user to reduce the entropy of the negotiated session key that is used to secure a Bluetooth connection between a paired device and a host device.  An attacker who can successfully inject a malicious message into a Bluetooth connection during session negotiation or renegotiation could cause the strength of the session key to be susceptible to brute force attack. \nThis advisory will be updated as additional information becomes available. There are no workarounds that address this vulnerability. \n\nThis advisory is available at the following link:\ntools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth. 7) - aarch64, noarch, ppc64le\n\n3. \n\nBug Fix(es):\n\n* kernel modules pkey and paes_s390 are not available (BZ#1719192)\n\n* pkey: Indicate old mkvp only if old and curr. mkvp are different\n(BZ#1720621)\n\n* System dropped into Mon running softboots Exception: 501 (Hardware\nInterrupt) at c00000000000a814 replay_interrupt_return+0x0/0x4 (ipmi)\n(BZ#1737563)\n\n* kernel: jump label transformation performance (BZ#1739143)\n\n* Backport i40e MDD detection removal for PFs (BZ#1747618)\n\n4. 7.5) - ppc64, ppc64le, x86_64\n\n3. \n\nBug Fix(es):\n\n* TCP packets are segmented when sent to the VLAN device when coming from\nVXLAN dev. (BZ#1732810)\n\n* skb head copy occurs when sending traffic over OVS managed VXLAN tunnel\n(BZ#1733896)\n\n* [mlx4] VXLAN over VLAN TCP segmentation (BZ#1734306)\n\n* use \"make -jN\" for modules_install (BZ#1735082)\n\n* Backport TCP follow-up for small buffers (BZ#1739128)\n\n* [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree (BZ#1740176)\n\n* RHEL7.6 - powerpc/pseries: Disable CPU hotplug across migrations /\npowerpc/rtas: Fix a potential race between CPU-Offline & Migration (LPM)\n(BZ#1745437)\n\n* RHEL7.6 - powerpc/pseries: Fix unitialized timer reset on migration /\npowerpc/pseries/mobility: Extend start/stop topology update scope (LPM)\n(BZ#1745439)\n\n* RHEL7.5 - ISST-LTE:PVM:Zeppelin :LPM: Failure logs and stack trace seen\nduring LPM (POWER9/P9) (BZ#1745447)\n\n4. \n\nBug Fix(es):\n\n* port show-kabi to python3 (BZ#1806924)\n\n4. 7.6) - ppc64le, x86_64\n\n3. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. 7.3) - noarch, x86_64\n\n3. \n\nBug Fix(es):\n\n* kernel build: parallelize redhat/mod-sign.sh (BZ#1755326)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2019:3055-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2019:3055\nIssue date:        2019-10-15\nCVE Names:         CVE-2018-20856 CVE-2019-3846 CVE-2019-9506\n                   CVE-2019-10126\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* kernel: Use-after-free in __blk_drain_queue() function in\nblock/blk-core.c (CVE-2018-20856)\n\n* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in\nmarvell/mwifiex/scan.c (CVE-2019-3846)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)\n(CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in\ndrivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fixes:\n\n* gfs2: Fix iomap write page reclaim deadlock (BZ#1737373)\n\n* [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree (BZ#1740178)\n\n* high update_cfs_rq_blocked_load contention (BZ#1740180)\n\n* [Hyper-V][RHEL 7] kdump fails to start on a Hyper-V guest of Windows\nServer 2019. (BZ#1740188)\n\n* kvm: backport cpuidle-haltpoll driver (BZ#1740192)\n\n* Growing unreclaimable slab memory (BZ#1741920)\n\n* [bnx2x] ping failed from pf to vf which has been attached to vm\n(BZ#1741926)\n\n* [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with >\n240 vCPUs (i.e., when in x2APIC mode) (BZ#1743324)\n\n* Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid\n(BZ#1744442)\n\n* RHEL 7.7 Beta - Hit error when trying to run nvme connect with IPv6\naddress (BZ#1744443)\n\n* RHEL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system\n(BZ#1744444)\n\n* NFSv4.0 client sending a double CLOSE (leading to EIO application\nfailure) (BZ#1744946)\n\n* [Azure] CRI-RDOS | [RHEL 7.8] Live migration only takes 10 seconds, but\nthe VM was unavailable for 2 hours (BZ#1748239)\n\n* NFS client autodisconnect timer may fire immediately after TCP connection\nsetup and may cause DoS type reconnect problem in complex network\nenvironments (BZ#1749290)\n\n* [Inspur] RHEL7.6 ASPEED graphic card display issue (BZ#1749296)\n\n* Allows macvlan to operated correctly over the active-backup mode to\nsupport bonding events. (BZ#1751579)\n\n* [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group\n(BZ#1752421)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix\nthese bugs. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c\n1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c\n1727857 - CVE-2019-9506 hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)\n1738705 - CVE-2018-20856 kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-1062.4.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm\nkernel-doc-3.10.0-1062.4.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1062.4.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-1062.4.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm\nkernel-doc-3.10.0-1062.4.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1062.4.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-1062.4.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm\nkernel-doc-3.10.0-1062.4.1.el7.noarch.rpm\n\nppc64:\nbpftool-3.10.0-1062.4.1.el7.ppc64.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debug-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-devel-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-headers-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-tools-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.ppc64.rpm\nperf-3.10.0-1062.4.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\npython-perf-3.10.0-1062.4.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-3.10.0-1062.4.1.el7.ppc64le.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.ppc64le.rpm\nperf-3.10.0-1062.4.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\npython-perf-3.10.0-1062.4.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\n\ns390x:\nbpftool-3.10.0-1062.4.1.el7.s390x.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-debug-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-devel-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-headers-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-kdump-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-1062.4.1.el7.s390x.rpm\nperf-3.10.0-1062.4.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\npython-perf-3.10.0-1062.4.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.s390x.rpm\n\nx86_64:\nbpftool-3.10.0-1062.4.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64.rpm\n\nppc64le:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.ppc64le.rpm\n\nx86_64:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-1062.4.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm\nkernel-doc-3.10.0-1062.4.1.el7.noarch.rpm\n\nx86_64:\nbpftool-3.10.0-1062.4.1.el7.x86_64.rpm\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nbpftool-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-1062.4.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-20856\nhttps://access.redhat.com/security/cve/CVE-2019-3846\nhttps://access.redhat.com/security/cve/CVE-2019-9506\nhttps://access.redhat.com/security/cve/CVE-2019-10126\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBXaYG69zjgjWX9erEAQjA1Q/7Bte0lgWfI6xE9bw9FqrE7ZFw3Jq5bqV1\n8PYYAZBFCLUHsC1HS33jiTGGaS5xbqR4yrtNCnZHLhsZU6w9avm0zDFW2CEzAwRC\nUri5R30mCVtc2p3jsHupNKrKhzzkmKjz2J5gYn+ubX9Ok7ScxZZ8ucF9kJcSx7LL\nqswocd0lWkbjy/2MY0t6MCMnvoNvgOB1XEmQE5a9CHrHtKe9kEJcWJUht6vXqhZ4\nSJYkMLDIsDYOXFsWBwZnKT0BVXNurS9+g7b7MX4ZaQATN5MD9x7jP7FYTIp8lhyJ\nNKOqa8/D5eFGKF3YlgySgqXZ22XT1MasENDJ7OS62lRQd+/eeznyK0CUOAtILLvH\n1GTfXgz8nvMynX+ZKkiZv5+tEFCWFNKkHudYuzoirFa+p29l0YWW6SjfPN+c3NnE\n9DLfZhqYuX2tcx3O8khxjS/okRh5mBFQvzXlWqyPmgqsbjP0L5R2YoPNMzzGB3OQ\nFA/QgjD8AD9Tn8+rZM+VeoWVYTwPT8OMv1wMEqOeJLIxR8/DiY42YEQiNBU2na4W\nAYajLwK6d3Ey+DV+/5YwjWWQOyyTxP9Q8F0xb61HdQmq1dILZJgFBmVR5ilxlpoJ\nsHiYCTKF/M8DbDGSWwZkD69ZPtBWPGvTI0XkgTIfhcTeF2BRL2UZkszrM72QjGqH\nOQh6hA3MyvA=zvD0\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* kernel-rt: update to the RHEL7.7.z batch#2 source tree (BZ#1748570)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2019-8-13-3 Additional information for\nAPPLE-SA-2019-7-22-4 watchOS 5.3\n\nwatchOS 5.3 addresses the following:\n\nBluetooth\nAvailable for: Apple Watch Series 1 and later\nImpact: An attacker in a privileged network position may be able to\nintercept Bluetooth traffic (Key Negotiation of Bluetooth - KNOB)\nDescription: An input validation issue existed in Bluetooth. This\nissue was addressed with improved input validation. \nCVE-2019-9506: Daniele Antonioli of SUTD, Singapore, Dr. Nils Ole\nTippenhauer of CISPA, Germany, and Prof. Kasper Rasmussen of\nUniversity of Oxford, England\nEntry added August 13, 2019\n\nCore Data\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nCore Data\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2019-8647: Samuel Groß and Natalie Silvanovich of Google Project\nZero\n\nCore Data\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project\nZero\n\nDigital Touch\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8624: Natalie Silvanovich of Google Project Zero\n\nFaceTime\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to cause arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu\n\nFoundation\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project\nZero\n\nHeimdal\nAvailable for: Apple Watch Series 1 and later\nImpact: An issue existed in Samba that may allow attackers to perform\nunauthorized actions by intercepting communications between services\nDescription: This issue was addressed with improved checks to prevent\nunauthorized actions. \nCVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team\nand Catalyst\n\nlibxslt\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to view sensitive information\nDescription: A stack overflow was addressed with improved input\nvalidation. \nCVE-2019-13118: found by OSS-Fuzz\n\nMessages\nAvailable for: Apple Watch Series 1 and later\nImpact: Users removed from an iMessage conversation may still be able\nto alter state\nDescription: This issue was addressed with improved checks. \nCVE-2019-8659: Ryan Kontos (@ryanjkontos), Will Christensen of\nUniversity of Oregon\n\nMessages\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may cause an unexpected application\ntermination\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2019-8665: Michael Hernandez of XYZ Marketing\n\nQuick Look\nAvailable for: Apple Watch Series 1 and later\nImpact: An attacker may be able to trigger a use-after-free in an\napplication deserializing an untrusted NSDictionary\nDescription: This issue was addressed with improved checks. \nCVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project\nZero\n\nSiri\nAvailable for: Apple Watch Series 1 and later\nImpact: A remote attacker may be able to leak memory\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8646: Natalie Silvanovich of Google Project Zero\n\nUIFoundation\nAvailable for: Apple Watch Series 1 and later\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2019-8657: riusksk of VulWar Corp working with Trend Micro's Zero\nDay Initiative\n\nWallet\nAvailable for: Apple Watch Series 1 and later\nImpact: A user may inadvertently complete an in-app purchase while on\nthe lock screen\nDescription: The issue was addressed with improved UI handling. \nCVE-2019-8682: Jeff Braswell (JeffBraswell.com)\n\nWebKit\nAvailable for: Apple Watch Series 1 and later\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2019-8658: akayn working with Trend Micro's Zero Day Initiative\n\nWebKit\nAvailable for: Apple Watch Series 1 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2019-8669: akayn working with Trend Micro's Zero Day Initiative\nCVE-2019-8672: Samuel Groß of Google Project Zero\nCVE-2019-8676: Soyeon Park and Wen Xu of SSLab at Georgia Tech\nCVE-2019-8683: lokihardt of Google Project Zero\nCVE-2019-8684: lokihardt of Google Project Zero\nCVE-2019-8685: akayn, Dongzhuo Zhao working with ADLab of Venustech,\nKen Wong (@wwkenwong) of VXRL, Anthony Lai (@darkfloyd1014) of VXRL,\nand Eric Lung (@Khlung1) of VXRL\nCVE-2019-8688: Insu Yun of SSLab at Georgia Tech\nCVE-2019-8689: lokihardt of Google Project Zero\n\nAdditional recognition\n\nMobileInstallation\nWe would like to acknowledge Dany Lisiansky (@DanyL931) for their\nassistance. \n\nInstallation note:\n\nInstructions on how to update your Apple Watch software are\navailable at https://support.apple.com/kb/HT204641\n\nTo check the version on your Apple Watch, open the Apple Watch app\non your iPhone and select \"My Watch > General > About\". \n\nAlternatively, on your watch, select \"My Watch > General > About\"",
      sources: [
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            db: "PACKETSTORM",
            id: "154879",
         },
         {
            db: "PACKETSTORM",
            id: "154056",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2019-9506",
            trust: 2.8,
         },
         {
            db: "CERT/CC",
            id: "VU#918987",
            trust: 1.8,
         },
         {
            db: "PACKETSTORM",
            id: "157216",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0141",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.1366",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.1189",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.1366.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4346",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4346.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4676",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0262",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.3115",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4252",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.1338",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4584",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "156058",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-27173",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "155017",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "155004",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "154949",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154936",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-160941",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "155005",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154779",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "155147",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154863",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154862",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154879",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "154056",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            db: "PACKETSTORM",
            id: "154879",
         },
         {
            db: "PACKETSTORM",
            id: "154056",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   id: "VAR-201908-1958",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
      ],
      trust: 0.5494931403571428,
   },
   last_update_date: "2024-07-23T21:39:23.746000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Bluetooth Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=96553",
         },
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2019/08/22/cisco_patch_bundle/",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193187 - security advisory",
         },
         {
            title: "Red Hat: Important: kpatch-patch security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193231 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20192975 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193165 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193218 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20201460 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193220 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193089 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193055 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel-alt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193217 - security advisory",
         },
         {
            title: "Red Hat: Important: kpatch-patch security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193076 - security advisory",
         },
         {
            title: "Red Hat: CVE-2019-9506",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2019-9506",
         },
         {
            title: "Cisco: Key Negotiation of Bluetooth Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20190813-bluetooth",
         },
         {
            title: "HP: HPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=hpsbpi03634",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20200204 - security advisory",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=814c3d5b0bc03fc1c34e62dbc5cf6bf7",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBPI03634 rev. 1 - HP OfficeJet Mobile and Sprocket Printers KNOB Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=20bba81176880ee641f9d46354adc125",
         },
         {
            title: "Red Hat: Important: kernel security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193517 - security advisory",
         },
         {
            title: "Huawei Security Advisories: Security Advisory - Key Negotiation of Bluetooth (KNOB) Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=4da976eef66883f5331725800e5cf063",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20193309 - security advisory",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-gke-5.0, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4147-1",
         },
         {
            title: "Fortinet Security Advisories: CVE-2019-9506 Encryption Key Negotiation of Bluetooth Vulnerability",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=fg-ir-19-224",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2 regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4115-2",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4115-1",
         },
         {
            title: "Ubuntu Security Notice: linux-aws vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-4118-1",
         },
         {
            title: "knob",
            trust: 0.1,
            url: "https://github.com/francozappa/knob ",
         },
         {
            title: "bluetooth-KNOB",
            trust: 0.1,
            url: "https://github.com/u10427687/bluetooth-knob ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/makaubenson/fix-bt-ubuntu ",
         },
         {
            title: "broadcom-bt-firmware",
            trust: 0.1,
            url: "https://github.com/winterheart/broadcom-bt-firmware ",
         },
         {
            title: "broadcom-bt-firmware",
            trust: 0.1,
            url: "https://github.com/alexandrbing/broadcom-bt-firmware ",
         },
         {
            title: "Protocol-Vul",
            trust: 0.1,
            url: "https://github.com/winmin/protocol-vul ",
         },
         {
            title: "awesome-bluetooth-security",
            trust: 0.1,
            url: "https://github.com/engn33r/awesome-bluetooth-security ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/jeffromf/awesome-bluetooth-security321 ",
         },
         {
            title: "PoC-in-GitHub",
            trust: 0.1,
            url: "https://github.com/developer3000s/poc-in-github ",
         },
         {
            title: "CVE-POC",
            trust: 0.1,
            url: "https://github.com/0xt11/cve-poc ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/vincent-deng/veracode-container-security-finding-parser ",
         },
         {
            title: "PoC-in-GitHub",
            trust: 0.1,
            url: "https://github.com/hectorgie/poc-in-github ",
         },
         {
            title: "PoC-in-GitHub",
            trust: 0.1,
            url: "https://github.com/nomi-sec/poc-in-github ",
         },
         {
            title: "Symantec Threat Intelligence Blog",
            trust: 0.1,
            url: "https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-august-2019",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/cisco-patches-six-critical-bugs/147585/",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/lenovo-warns-bugs-thinkpads/147338/",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/wormable-remote-desktop-bugs-august-patch-tuesday/147302/",
         },
         {
            title: "BleepingComputer",
            trust: 0.1,
            url: "https://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-traffic/",
         },
         {
            title: "BleepingComputer",
            trust: 0.1,
            url: "https://www.bleepingcomputer.com/news/security/new-bluetooth-knob-flaw-lets-attackers-manipulate-connections/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-327",
            trust: 1.1,
         },
         {
            problemtype: "CWE-310",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "https://access.redhat.com/errata/rhsa-2020:0204",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:2975",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3055",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3076",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3089",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3187",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3217",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3218",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3231",
         },
         {
            trust: 1.9,
            url: "https://access.redhat.com/errata/rhsa-2019:3517",
         },
         {
            trust: 1.8,
            url: "https://www.kb.cert.org/vuls/id/918987/",
         },
         {
            trust: 1.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
         },
         {
            trust: 1.8,
            url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
         },
         {
            trust: 1.8,
            url: "http://seclists.org/fulldisclosure/2019/aug/11",
         },
         {
            trust: 1.8,
            url: "http://seclists.org/fulldisclosure/2019/aug/13",
         },
         {
            trust: 1.8,
            url: "http://seclists.org/fulldisclosure/2019/aug/14",
         },
         {
            trust: 1.8,
            url: "http://seclists.org/fulldisclosure/2019/aug/15",
         },
         {
            trust: 1.8,
            url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
         },
         {
            trust: 1.8,
            url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
         },
         {
            trust: 1.8,
            url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
         },
         {
            trust: 1.8,
            url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
         },
         {
            trust: 1.8,
            url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:3165",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:3220",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:3309",
         },
         {
            trust: 1.8,
            url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
         },
         {
            trust: 1.8,
            url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
         },
         {
            trust: 1.8,
            url: "https://usn.ubuntu.com/4115-1/",
         },
         {
            trust: 1.8,
            url: "https://usn.ubuntu.com/4118-1/",
         },
         {
            trust: 1.8,
            url: "https://usn.ubuntu.com/4147-1/",
         },
         {
            trust: 1.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-9506",
         },
         {
            trust: 0.9,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/cve/cve-2019-9506",
         },
         {
            trust: 0.9,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.9,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.7,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190813-bluetooth",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/157216/red-hat-security-advisory-2020-1460-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.1338/",
         },
         {
            trust: 0.6,
            url: "https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-9506",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-27173",
         },
         {
            trust: 0.6,
            url: "https://support.apple.com/en-us/ht210353",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4676/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4346/",
         },
         {
            trust: 0.6,
            url: "https://support.apple.com/en-us/ht210346",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4252/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4584/",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190828-01-knob-cn",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0141/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0262/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/156058/red-hat-security-advisory-2020-0204-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.3115/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/bluetooth-br-edr-information-disclosure-via-key-negotiation-30041",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4346.2/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.1189/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.1366/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.1366.2/",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-20856",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2018-20856",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10126",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2019-10126",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2019-3846",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3846",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/327.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://github.com/francozappa/knob",
         },
         {
            trust: 0.1,
            url: "https://www.kb.cert.org/vuls/id/918987",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-11810",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11810",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-9500",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10902",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-9500",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10902",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-1125",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-1125",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/4329821",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:1460",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-5489",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-11884",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11884",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3459",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-7222",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-16884",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3874",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10207",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-19985",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-13233",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-14821",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-19854",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10207",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3882",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11599",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3874",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-13233",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-11599",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14821",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-20169",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-20169",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-15916",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3460",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-5489",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3460",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10638",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-1593",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-1593",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-7222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-19985",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11833",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3900",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-19854",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10638",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-15916",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3882",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-16884",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-11833",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3459",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3900",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8659",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht204641",
         },
         {
            trust: 0.1,
            url: "https://support.apple.com/kb/ht201222",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-16860",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8669",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8646",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8688",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-13118",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8672",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8658",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8648",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8641",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8647",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8684",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8683",
         },
         {
            trust: 0.1,
            url: "https://www.apple.com/support/security/pgp/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8624",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8682",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8665",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8660",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8657",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8689",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8676",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8685",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8662",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            db: "PACKETSTORM",
            id: "154879",
         },
         {
            db: "PACKETSTORM",
            id: "154056",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            db: "PACKETSTORM",
            id: "154879",
         },
         {
            db: "PACKETSTORM",
            id: "154056",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-08-14T00:00:00",
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            date: "2019-08-14T00:00:00",
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            date: "2019-10-29T14:49:28",
            db: "PACKETSTORM",
            id: "155005",
         },
         {
            date: "2019-10-08T20:44:06",
            db: "PACKETSTORM",
            id: "154779",
         },
         {
            date: "2020-04-14T15:40:41",
            db: "PACKETSTORM",
            id: "157216",
         },
         {
            date: "2019-10-29T14:59:12",
            db: "PACKETSTORM",
            id: "155017",
         },
         {
            date: "2019-11-06T15:49:15",
            db: "PACKETSTORM",
            id: "155147",
         },
         {
            date: "2019-10-29T14:48:28",
            db: "PACKETSTORM",
            id: "155004",
         },
         {
            date: "2019-10-15T22:22:11",
            db: "PACKETSTORM",
            id: "154863",
         },
         {
            date: "2019-10-15T22:21:55",
            db: "PACKETSTORM",
            id: "154862",
         },
         {
            date: "2019-10-16T15:06:37",
            db: "PACKETSTORM",
            id: "154879",
         },
         {
            date: "2019-08-14T20:32:22",
            db: "PACKETSTORM",
            id: "154056",
         },
         {
            date: "2019-08-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            date: "2019-08-14T17:15:11.597000",
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-11-04T00:00:00",
            db: "VULHUB",
            id: "VHN-160941",
         },
         {
            date: "2021-11-04T00:00:00",
            db: "VULMON",
            id: "CVE-2019-9506",
         },
         {
            date: "2021-11-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
         {
            date: "2021-11-04T15:58:19.197000",
            db: "NVD",
            id: "CVE-2019-9506",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote or local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Bluetooth BR/EDR Encryption problem vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201908-864",
         },
      ],
      trust: 0.6,
   },
}

cve-2019-9506
Vulnerability from cvelistv5
Published
2019-08-14 16:27
Modified
2024-09-16 19:14
Summary
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.
References
https://www.kb.cert.org/vuls/id/918987/third-party-advisory, x_refsource_CERT-VN
http://www.cs.ox.ac.uk/publications/publication12404-abstract.htmlx_refsource_MISC
https://www.usenix.org/conference/usenixsecurity19/presentation/antoniolix_refsource_MISC
https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2019/Aug/14mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/11mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/13mailing-list, x_refsource_FULLDISC
http://seclists.org/fulldisclosure/2019/Aug/15mailing-list, x_refsource_FULLDISC
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-enx_refsource_CONFIRM
https://usn.ubuntu.com/4115-1/vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/4118-1/vendor-advisory, x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.htmlmailing-list, x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.htmlmailing-list, x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.htmlmailing-list, x_refsource_MLIST
https://usn.ubuntu.com/4147-1/vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2019:2975vendor-advisory, x_refsource_REDHAT
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.htmlvendor-advisory, x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.htmlvendor-advisory, x_refsource_SUSE
https://access.redhat.com/errata/RHSA-2019:3076vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3055vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3089vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3187vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3165vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3217vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3220vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3231vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3218vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3309vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:3517vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2020:0204vendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Bluetooth BR/EDR Version: 5.1   <
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T21:54:44.303Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#918987",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/918987/",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
               },
               {
                  name: "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Aug/14",
               },
               {
                  name: "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Aug/11",
               },
               {
                  name: "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Aug/13",
               },
               {
                  name: "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Aug/15",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
               },
               {
                  name: "USN-4115-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4115-1/",
               },
               {
                  name: "USN-4118-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4118-1/",
               },
               {
                  name: "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
               },
               {
                  name: "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
               },
               {
                  name: "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
               },
               {
                  name: "USN-4147-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4147-1/",
               },
               {
                  name: "RHSA-2019:2975",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:2975",
               },
               {
                  name: "openSUSE-SU-2019:2307",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
               },
               {
                  name: "openSUSE-SU-2019:2308",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
               },
               {
                  name: "RHSA-2019:3076",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3076",
               },
               {
                  name: "RHSA-2019:3055",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3055",
               },
               {
                  name: "RHSA-2019:3089",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3089",
               },
               {
                  name: "RHSA-2019:3187",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3187",
               },
               {
                  name: "RHSA-2019:3165",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3165",
               },
               {
                  name: "RHSA-2019:3217",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3217",
               },
               {
                  name: "RHSA-2019:3220",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3220",
               },
               {
                  name: "RHSA-2019:3231",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3231",
               },
               {
                  name: "RHSA-2019:3218",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3218",
               },
               {
                  name: "RHSA-2019:3309",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3309",
               },
               {
                  name: "RHSA-2019:3517",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3517",
               },
               {
                  name: "RHSA-2020:0204",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2020:0204",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               platforms: [
                  "N/A",
               ],
               product: "BR/EDR",
               vendor: "Bluetooth",
               versions: [
                  {
                     lessThanOrEqual: "5.1",
                     status: "affected",
                     version: "5.1",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen",
            },
         ],
         datePublic: "2019-08-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 7.6,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-310",
                     description: "CWE-310 Cryptographic Issues",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-01-30T10:06:23",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               name: "VU#918987",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/918987/",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
            },
            {
               name: "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Aug/14",
            },
            {
               name: "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Aug/11",
            },
            {
               name: "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Aug/13",
            },
            {
               name: "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Aug/15",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
            },
            {
               name: "USN-4115-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4115-1/",
            },
            {
               name: "USN-4118-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4118-1/",
            },
            {
               name: "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
            },
            {
               name: "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
            },
            {
               name: "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
            },
            {
               name: "USN-4147-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4147-1/",
            },
            {
               name: "RHSA-2019:2975",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:2975",
            },
            {
               name: "openSUSE-SU-2019:2307",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
            },
            {
               name: "openSUSE-SU-2019:2308",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
            },
            {
               name: "RHSA-2019:3076",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3076",
            },
            {
               name: "RHSA-2019:3055",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3055",
            },
            {
               name: "RHSA-2019:3089",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3089",
            },
            {
               name: "RHSA-2019:3187",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3187",
            },
            {
               name: "RHSA-2019:3165",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3165",
            },
            {
               name: "RHSA-2019:3217",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3217",
            },
            {
               name: "RHSA-2019:3220",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3220",
            },
            {
               name: "RHSA-2019:3231",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3231",
            },
            {
               name: "RHSA-2019:3218",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3218",
            },
            {
               name: "RHSA-2019:3309",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3309",
            },
            {
               name: "RHSA-2019:3517",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2019:3517",
            },
            {
               name: "RHSA-2020:0204",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2020:0204",
            },
         ],
         source: {
            advisory: "VU#918987",
            defect: [
               "VU#918987",
            ],
            discovery: "EXTERNAL",
         },
         title: "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
         workarounds: [
            {
               lang: "en",
               value: "Bluetooth SIG Expedited Errata Correction 11838",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.7",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               AKA: "KNOB",
               ASSIGNER: "cert@cert.org",
               DATE_PUBLIC: "2019-08-14",
               ID: "CVE-2019-9506",
               STATE: "PUBLIC",
               TITLE: "Blutooth BR/EDR specification does not specify sufficient encryption key length and allows an attacker to influence key length negotiation",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "BR/EDR",
                                 version: {
                                    version_data: [
                                       {
                                          platform: "N/A",
                                          version_affected: "<=",
                                          version_name: "5.1",
                                          version_value: "5.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Bluetooth",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Daniele Antonioli‚ Nils Ole Tippenhauer, Kasper Rasmussen",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.7",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "ADJACENT_NETWORK",
                  availabilityImpact: "LOW",
                  baseScore: 7.6,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-310 Cryptographic Issues",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#918987",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/918987/",
                  },
                  {
                     name: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
                     refsource: "MISC",
                     url: "http://www.cs.ox.ac.uk/publications/publication12404-abstract.html",
                  },
                  {
                     name: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
                     refsource: "MISC",
                     url: "https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli",
                  },
                  {
                     name: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
                     refsource: "CONFIRM",
                     url: "https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/",
                  },
                  {
                     name: "20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Aug/14",
                  },
                  {
                     name: "20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Aug/11",
                  },
                  {
                     name: "20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Aug/13",
                  },
                  {
                     name: "20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Aug/15",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en",
                  },
                  {
                     name: "USN-4115-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4115-1/",
                  },
                  {
                     name: "USN-4118-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4118-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html",
                  },
                  {
                     name: "[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html",
                  },
                  {
                     name: "[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html",
                  },
                  {
                     name: "USN-4147-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4147-1/",
                  },
                  {
                     name: "RHSA-2019:2975",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:2975",
                  },
                  {
                     name: "openSUSE-SU-2019:2307",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html",
                  },
                  {
                     name: "openSUSE-SU-2019:2308",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html",
                  },
                  {
                     name: "RHSA-2019:3076",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3076",
                  },
                  {
                     name: "RHSA-2019:3055",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3055",
                  },
                  {
                     name: "RHSA-2019:3089",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3089",
                  },
                  {
                     name: "RHSA-2019:3187",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3187",
                  },
                  {
                     name: "RHSA-2019:3165",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3165",
                  },
                  {
                     name: "RHSA-2019:3217",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3217",
                  },
                  {
                     name: "RHSA-2019:3220",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3220",
                  },
                  {
                     name: "RHSA-2019:3231",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3231",
                  },
                  {
                     name: "RHSA-2019:3218",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3218",
                  },
                  {
                     name: "RHSA-2019:3309",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3309",
                  },
                  {
                     name: "RHSA-2019:3517",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2019:3517",
                  },
                  {
                     name: "RHSA-2020:0204",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2020:0204",
                  },
               ],
            },
            source: {
               advisory: "VU#918987",
               defect: [
                  "VU#918987",
               ],
               discovery: "EXTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "Bluetooth SIG Expedited Errata Correction 11838",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2019-9506",
      datePublished: "2019-08-14T16:27:45.059869Z",
      dateReserved: "2019-03-01T00:00:00",
      dateUpdated: "2024-09-16T19:14:13.573Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-0069
Vulnerability from cvelistv5
Published
2020-03-10 19:56
Modified
2024-08-04 05:47
Severity ?
Summary
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
Impacted products
Vendor Product Version
n/a Android Version: Android kernel
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T05:47:40.759Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://source.android.com/security/bulletin/2020-03-01",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Android",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Android kernel",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-05-27T11:06:04",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://source.android.com/security/bulletin/2020-03-01",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2020-0069",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Android",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Android kernel",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://source.android.com/security/bulletin/2020-03-01",
                     refsource: "MISC",
                     url: "https://source.android.com/security/bulletin/2020-03-01",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2020-0069",
      datePublished: "2020-03-10T19:56:37",
      dateReserved: "2019-10-17T00:00:00",
      dateUpdated: "2024-08-04T05:47:40.759Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}