Vulnerabilites related to huawei - rhone-al00
Vulnerability from fkie_nvd
Published
2019-10-11 19:15
Modified
2024-11-21 04:40
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
References
security@android.comhttp://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
security@android.comhttp://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlPatch, Third Party Advisory, VDB Entry
security@android.comhttp://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
security@android.comhttp://seclists.org/fulldisclosure/2019/Oct/38Mailing List, Third Party Advisory
security@android.comhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-enThird Party Advisory
security@android.comhttps://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMailing List, Third Party Advisory
security@android.comhttps://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMailing List, Third Party Advisory
security@android.comhttps://seclists.org/bugtraq/2019/Nov/11Mailing List, Patch, Third Party Advisory
security@android.comhttps://security.netapp.com/advisory/ntap-20191031-0005/Third Party Advisory
security@android.comhttps://source.android.com/security/bulletin/2019-10-01Vendor Advisory
security@android.comhttps://usn.ubuntu.com/4186-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.htmlPatch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Oct/38Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-enThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/01/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/03/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Nov/11Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20191031-0005/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://source.android.com/security/bulletin/2019-10-01Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4186-1/Third Party Advisory
Impacted products
Vendor Product Version
google android -
debian debian_linux 8.0
canonical ubuntu_linux 16.04
netapp cloud_backup -
netapp data_availability_services -
netapp hci_management_node -
netapp service_processor -
netapp solidfire -
netapp steelstore_cloud_integrated_storage -
netapp solidfire_baseboard_management_controller_firmware -
netapp solidfire_baseboard_management_controller -
netapp aff_baseboard_management_controller_firmware -
netapp aff_baseboard_management_controller a700s
netapp a320_firmware -
netapp a320 -
netapp c190_firmware -
netapp c190 -
netapp a220_firmware -
netapp a220 -
netapp fas2720_firmware -
netapp fas2720 -
netapp fas2750_firmware -
netapp fas2750 -
netapp a800_firmware -
netapp a800 -
netapp h300s_firmware -
netapp h300s -
netapp h500s_firmware -
netapp h500s -
netapp h700s_firmware -
netapp h700s -
netapp h410s_firmware -
netapp h410s -
netapp h410c_firmware -
netapp h410c -
netapp h610s_firmware -
netapp h610s -
huawei alp-al00b_firmware *
huawei alp-al00b -
huawei alp-tl00b_firmware *
huawei alp-tl00b -
huawei anne-al00_firmware *
huawei anne-al00 -
huawei ares-al00b_firmware *
huawei ares-al00b -
huawei ares-al10d_firmware *
huawei ares-al10d -
huawei ares-tl00chw_firmware *
huawei ares-tl00chw -
huawei bla-al00b_firmware *
huawei bla-al00b -
huawei bla-l29c_firmware *
huawei bla-l29c -
huawei bla-tl00b_firmware *
huawei bla-tl00b -
huawei barca-al00_firmware *
huawei barca-al00 -
huawei berkeley-l09_firmware *
huawei berkeley-l09 -
huawei berkeley-tl10_firmware *
huawei berkeley-tl10 -
huawei columbia-al00a_firmware *
huawei columbia-al00a -
huawei columbia-l29d_firmware *
huawei columbia-l29d -
huawei cornell-tl10b_firmware *
huawei cornell-tl10b -
huawei duke-l09i_firmware *
huawei duke-l09i -
huawei dura-al00a_firmware *
huawei dura-al00a -
huawei figo-al00a_firmware *
huawei figo-al00a -
huawei florida-al20b_firmware *
huawei florida-al20b -
huawei florida-l03_firmware *
huawei florida-l03 -
huawei florida-l21_firmware *
huawei florida-l21 -
huawei florida-l22_firmware *
huawei florida-l22 -
huawei florida-tl10b_firmware *
huawei florida-tl10b -
huawei mate_rs_firmware 9.1.0.321\(c786e320r1p1t8\)
huawei mate_rs -
huawei p20_firmware *
huawei p20 -
huawei p20_lite_firmware *
huawei p20_lite -
huawei p20_lite_firmware *
huawei p20_lite -
huawei p20_lite_firmware *
huawei p20_lite -
huawei y9_2019_firmware *
huawei y9_2019 -
huawei nova_2s_firmware *
huawei nova_2s -
huawei nova_3_firmware *
huawei nova_3 -
huawei nova_3e_firmware *
huawei nova_3e -
huawei p20_lite_firmware *
huawei p20_lite -
huawei p20_lite_firmware *
huawei p20_lite -
huawei nova_3e_firmware *
huawei nova_3e -
huawei nova_3e_firmware *
huawei nova_3e -
huawei p20_lite_firmware *
huawei p20_lite -
huawei honor_view_20_firmware *
huawei honor_view_20 -
huawei jakarta-al00a_firmware *
huawei jakarta-al00a -
huawei johnson-tl00d_firmware *
huawei johnson-tl00d -
huawei leland-al10b_firmware *
huawei leland-al10b -
huawei leland-l21a_firmware *
huawei leland-l21a -
huawei leland-l32a_firmware *
huawei leland-l32a -
huawei leland-tl10b_firmware *
huawei leland-tl10b -
huawei leland-tl10c_firmware *
huawei leland-tl10c -
huawei lelandp-al00c_firmware *
huawei lelandp-al00c -
huawei lelandp-l22c_firmware *
huawei lelandp-l22c -
huawei neo-al00d_firmware *
huawei neo-al00d -
huawei princeton-al10b_firmware *
huawei princeton-al10b -
huawei rhone-al00_firmware *
huawei rhone-al00 -
huawei stanford-l09_firmware *
huawei stanford-l09 -
huawei stanford-l09s_firmware *
huawei stanford-l09s -
huawei sydney-al00_firmware *
huawei sydney-al00 -
huawei sydney-tl00_firmware *
huawei sydney-tl00 -
huawei sydneym-al00_firmware *
huawei sydneym-al00 -
huawei tony-al00b_firmware *
huawei tony-al00b -
huawei tony-tl00b_firmware *
huawei tony-tl00b -
huawei yale-al00a_firmware *
huawei yale-al00a -
huawei yale-l21a_firmware *
huawei yale-l21a -
huawei yale-tl00b_firmware *
huawei yale-tl00b -
huawei honor_9i_firmware *
huawei honor_9i -



{
   cisaActionDue: "2022-05-03",
   cisaExploitAdd: "2021-11-03",
   cisaRequiredAction: "Apply updates per vendor instructions.",
   cisaVulnerabilityName: "Android Kernel Use-After-Free Vulnerability",
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
                     matchCriteriaId: "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2089EE-5D7F-47EC-8EA5-0F69790564C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EF46487-B64A-454E-AECC-D74B83170ACD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3C19813-E823-456A-B1CE-EC0684CE1953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "146A767F-DC04-454B-9913-17D3A2B5AAA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E94F7F59-1785-493F-91A7-5F5EA5E87E4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB9B8171-F6CA-427D-81E0-6536D3BBFA8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "090AA6F4-4404-4E26-82AB-C3A22636F276",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:aff_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4D90857-AB13-47AF-B42A-7ADB190DB189",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:aff_baseboard_management_controller:a700s:*:*:*:*:*:*:*",
                     matchCriteriaId: "804B2D7C-D890-4C4C-8A76-1760552E11BC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:a320_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ADE5E80-06D3-4A1B-A655-FBB6CCA03939",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:a320:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FD5E05-3C58-465F-9D4F-ECC2CD78DCFF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:c190:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D421A96-E6E9-4B27-ADE0-D8E87A82EEDE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F2D2745-242C-4603-899E-70C9025BDDD2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:a220:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFB4541D-5EF7-4266-BFF3-2DDEC95E8012",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7FD1DA9-7980-4643-B378-7095892DA176",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:fas2720:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "347E9E3E-941C-4109-B59F-B9BB05486B34",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD661062-0D5B-4671-9D92-FEF8D7395C1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:fas2750:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8155BF5F-DD1B-4AB4-81F8-9BCE6A8821AE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B36CECA5-4545-49C2-92EB-B739407B207F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:a800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8E7549A-DE35-4274-B3F6-22D51C7A6613",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56409CEC-5A1E-4450-AA42-641E459CC2AF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8497A4C9-8474-4A62-8331-3FE862ED4098",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6D335F3-297A-4554-A0DC-E21B32DB2942",
                     versionEndExcluding: "10.0.0.162\\(c00e156r2p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FA2B2F1-3D58-4DC7-AB7A-28BF8B282333",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:alp-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6BCC614-F819-4848-A575-1EA8165ACA38",
                     versionEndExcluding: "10.0.0.162\\(c01e156r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:alp-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7918CD6-341B-4FCC-BD31-30B8952192C8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C3D122C-8B73-4D58-A82F-1A4AC75DD0A9",
                     versionEndExcluding: "9.1.0.126\\(c00e126r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CCF81FB-C379-4D15-9CA7-E59974F53B77",
                     versionEndExcluding: "9.1.0.165\\(c00e165r2p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F6F4AE-1938-4E92-8DBD-A80B703EDCA9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-al10d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3E53657-BC96-4EB4-8AC5-865346E732CC",
                     versionEndExcluding: "9.1.0.165\\(c00e165r2p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-al10d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56298B1-7923-44E1-B9D5-78C030792209",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:ares-tl00chw_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2934E6C1-FDAE-495B-9D02-8BD40B186F5F",
                     versionEndExcluding: "8.2.0.163\\(c01r2p1\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:ares-tl00chw:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "56A210C7-08C6-4FDA-951B-AA9DA99F97DD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "118F23B4-3D14-47DA-8382-D2AA89516483",
                     versionEndExcluding: "10.0.0.170\\(c786e170r2p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B11D6D9B-335B-404C-88F3-590DF9E5D878",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "72254170-D96B-479B-86DD-9E9A93A7A675",
                     versionEndExcluding: "9.1.0.300\\(c432e4r1p11t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "551386D1-3D02-4319-B2A2-1AAE80F7F249",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bla-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F005F9E1-E61D-4559-AF6B-3ECFEDA687AF",
                     versionEndExcluding: "10.0.0.170\\(c01e170r1p4\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bla-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAAF02E9-8732-4E8E-8AA6-A422C200F9B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:barca-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BFDE403-5A29-4A02-8E62-041E4A23ADD2",
                     versionEndExcluding: "8.0.0.377\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:barca-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FA823EC-2A56-4C48-8FB5-317B6ED81E40",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "865F26AC-8EA6-4003-953C-1FF933AC2A25",
                     versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB51593F-70AE-47F6-AFE5-02693181E599",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:berkeley-tl10_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F36EF5C3-FF4A-4849-97C3-FD4BC05FBCD5",
                     versionEndExcluding: "9.1.0.333\\(c01e333r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:berkeley-tl10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CE70011-5F76-460B-ABB5-7C738B0AB2CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B00FF2D-9E0B-4C38-9C6B-23052D7B6339",
                     versionEndExcluding: "8.1.0.186\\(c00gt\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D4D3605-6171-437D-9319-068DC8E9E7E0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "617327F7-0DFA-4239-BF02-FA0B22AAF6AF",
                     versionEndExcluding: "9.1.0.325\\(c432e4r1p12t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07042814-6B3A-4D7C-A776-02DA9AC9B8DC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E771D6E9-1177-4579-8065-8DC0BB6A73F8",
                     versionEndExcluding: "9.1.0.321\\(c01e320r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "73F60E9A-0ACB-4E44-ADFB-771C695FCF08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:duke-l09i_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88B97220-A86A-4F07-8DCA-9E44DBA7137F",
                     versionEndExcluding: "9.0.1.171\\(c675e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:duke-l09i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90C6E2FE-741F-4241-A123-F6934948BB12",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4",
                     versionEndExcluding: "1.0.0.190\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC591FA6-55E1-4628-AE43-CD1E2A4980E9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:figo-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "181B057A-E12F-44A7-BEF3-3D0F78D5BE7A",
                     versionEndExcluding: "9.1.0.130\\(c00e115r2p8t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:figo-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1319FFD-91B6-4A56-BF45-256692D75FDD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-al20b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AED8A17-5120-4F1F-819B-C2592FC73411",
                     versionEndExcluding: "9.1.0.128\\(c00e112r1p6t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-al20b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DF7DFEE-5C99-4C65-B3D8-AEE21E81A6BA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l03_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "011099DF-3D08-417C-A4BE-838EC9755F48",
                     versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l03:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D7A1E5A-A17C-4495-82A0-0A7C58185971",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l21_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A5627E2-1D73-40B2-A2E7-864AD016E07C",
                     versionEndExcluding: "9.1.0.154\\(c605e7r1p2t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l21:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88CD5EEC-DA40-4B35-A2CD-6F48147F0810",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-l22_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "49F91DCF-B3DF-4087-A608-0E6A06DE6FA4",
                     versionEndExcluding: "9.1.0.150\\(c636e6r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-l22:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1387541-860F-43AE-809B-AFA9338DC378",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:florida-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1E7E0ED-EB2E-4A55-B81D-8ECE3FD3AE58",
                     versionEndExcluding: "9.1.0.128\\(c01e112r1p6t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:florida-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4776C729-200A-4D86-B635-185B65FC2570",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:mate_rs_firmware:9.1.0.321\\(c786e320r1p1t8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "887851AE-6FD5-4C7D-AAB5-2791E98DF578",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FBDD07EB-20AB-4E6F-B009-60A2C08C3B1C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3A590F5-A49B-4752-9EF0-290A03055D67",
                     versionEndExcluding: "9.1.0.312\\(c00e312r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7492911B-4242-4947-9DED-9F48FC0875CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A03D81-1266-40CF-8FB1-E91B02544D6B",
                     versionEndExcluding: "9.1.0.200\\(c605e4r1p3t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0D11586-3604-4609-8643-25778B8A239D",
                     versionEndExcluding: "9.1.0.200\\(c635e5r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B7E4CBB-A552-46F6-97C5-EA8C80B7E156",
                     versionEndExcluding: "9.1.0.246\\(c432e6r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D327D03E-A9A5-4DEA-9E99-E21CD6FE352D",
                     versionEndExcluding: "9.1.0.297\\(c605e4r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F48ABE15-BC87-4B02-8B39-94DA1DC96B92",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_2s_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9017B3E4-3C5A-42B4-84E6-DF61C4E49DF0",
                     versionEndExcluding: "9.1.0.210\\(c01e110r1p9t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_2s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "564CA70A-8211-4C36-B8C6-CF29369E43D3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64C5F693-BB20-4061-8614-11BCD9F95117",
                     versionEndExcluding: "9.1.0.351\\(c00e351r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF68FFB0-01F8-4937-8BF4-36866F02E9A8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2C2381E-886E-4992-873F-BF41B24AD4D7",
                     versionEndExcluding: "9.1.0.200\\(c636e4r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AD38BEC-57FC-468A-8AAF-B56408575E45",
                     versionEndExcluding: "9.1.0.200\\(c636e4r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1733163A-DE27-488D-8A56-289A7AB629DC",
                     versionEndExcluding: "9.1.0.201\\(c636e4r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DA5C946-EDC4-4219-B745-75388B292BF0",
                     versionEndExcluding: "9.1.0.201\\(c636e4r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:nova_3e_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6800926-B3F6-4820-8D05-1153F38A792A",
                     versionEndExcluding: "9.1.0.201\\(zafc185e4r1p8t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:nova_3e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "40066CF9-0528-40BB-8355-BEB7F187600A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:p20_lite_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9ABB62EE-FCEC-41E1-9640-A4E9D64B9819",
                     versionEndExcluding: "9.1.0.201\\(zafc185e4r1p8t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:p20_lite:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D316DCAD-2DE7-49F3-995A-10EBFA693398",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3BB4FCB-BDB1-4EFD-BE78-F16D56B63CDD",
                     versionEndExcluding: "10.1.0.214\\(c10e5r4p3\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A55CF4F-8E86-419C-845B-CE60070620A3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2187FAFD-772A-4200-AB9E-067DC8422890",
                     versionEndExcluding: "9.1.0.260\\(c00e120r2p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:johnson-tl00d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B6B7116-2FE3-4188-8E91-83365E15B5AF",
                     versionEndExcluding: "9.1.0.219\\(c01e18r3p2t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:johnson-tl00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "566629E0-84F2-4DFA-A20E-2D20C472E4B9",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "10FD6A92-DCCC-413A-8871-2DB58E6ED2EE",
                     versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C42CB5B-492C-40B0-9230-B15F540B121B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l21a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9233AB6A-2075-4615-8EA1-6088238BE099",
                     versionEndExcluding: "9.1.0.156\\(c185e5r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l21a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A663ACC5-FC2D-4FD7-BA9E-55344E257D4A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-l32a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4626E56-367C-4C0A-B920-C4138FF557DC",
                     versionEndExcluding: "9.1.0.153\\(c675e6r1p4t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-l32a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7704B5F-4164-477C-A528-2998092C81D0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-tl10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C54C4BF8-3F83-4E9C-8CD9-9F59B7BCD859",
                     versionEndExcluding: "9.1.0.130\\(c01e112r2p10t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDB8A667-95DE-4087-8418-49F5ACE194BD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:leland-tl10c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2BA2E31-DAC3-4CD3-8578-1FA190B815A9",
                     versionEndExcluding: "9.1.0.130\\(c01e112r2p10t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:leland-tl10c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11CB58EA-972E-460F-95F4-5413E05DA04C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-al00c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A27CC4DE-5A6A-40CD-BAE7-57B070B463EE",
                     versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-al00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BD659D6-F838-4668-901A-0C17AB18E7C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22c_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "06C48B38-0555-4116-B19A-58CC5FF2C80C",
                     versionEndExcluding: "9.1.0.156\\(c636e5r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80D7FA39-2EE4-49F8-9EF4-009304DB6108",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:neo-al00d_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DD3B902-FFD3-4F1D-8355-9DDC0A2C5275",
                     versionEndExcluding: "9.1.0.321\\(c786e320r1p1t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:neo-al00d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4B07FEC-514D-4A51-B26B-02254A867DC5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B4B9600-877F-458C-8E89-40E0B0D21E8A",
                     versionEndExcluding: "10.1.0.160\\(c00e160r2p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rhone-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "509E4F2C-2248-4B3B-8ABA-E52850E17B6C",
                     versionEndExcluding: "8.0.0.376\\(c00\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4584E368-FDA6-41FD-923F-74A30E404967",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:stanford-l09_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3D3655-4B7C-4211-9F41-F01C34A8EB70",
                     versionEndExcluding: "9.1.0.211\\(c635e2r1p4t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:stanford-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1BE2AB5-C033-41E2-A1EF-9DCAE8F2120B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:stanford-l09s_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D939D905-AD5E-4576-B381-921DA6FF7F57",
                     versionEndExcluding: "9.1.0.210\\(c432e2r1p5t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5091556-29A3-4781-A6CA-FB0BD03DEB01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE6D5B81-ED8D-41C1-88DD-9FD23EBD1ABE",
                     versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "66A35E71-4D6A-494D-882B-987CE16E3467",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5AAC87-00E5-4C00-95F2-6D9A9300954A",
                     versionEndExcluding: "9.1.0.212\\(c01e62r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C93EE0CF-AFF9-40B8-B306-3BC86F679B90",
                     versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ECB2A68-D67D-492F-9803-7524D96B735B",
                     versionEndExcluding: "10.0.0.175\\(c00e59r2p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E14B978-2A3C-4F55-8E3A-BA41AB137C33",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E60D3DEC-EAEC-44AF-9CFC-6A2174C2D8D1",
                     versionEndExcluding: "10.0.0.175\\(c01e59r2p11\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BDC1976-E07B-4464-84DB-EACAE30D97E5",
                     versionEndExcluding: "10.1.0.160\\(c00e160r8p12\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "562D05D2-CC9E-4973-9E8D-B40C0ED6C721",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2221682B-7C40-43F0-8BE4-64872D0388E6",
                     versionEndExcluding: "10.1.0.231\\(c10e3r3p2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:yale-tl00b_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C61685-A7A9-4E2E-BA7B-15A3C32B3F4B",
                     versionEndExcluding: "10.1.0.160\\(c01e160r8p12\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:yale-tl00b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4177D27-D234-4BBF-A4D9-1C0DCE5B322C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:honor_9i_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "687E4FF2-3AA5-4E10-9911-6634A77EDCF1",
                     versionEndExcluding: "9.1.0.130\\(c00e112r2p10t8\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:honor_9i:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F931151C-4D0A-44D1-9417-B467F7E148A2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095",
      },
      {
         lang: "es",
         value: "Un uso de la memoria previamente liberada en el archivo binder.c, permite una elevación de privilegios desde una aplicación en el kernel de Linux. No es requerida una interacción del usuario para explotar esta vulnerabilidad, sin embargo, la explotación necesita de la instalación de una aplicación local maliciosa o una vulnerabilidad separada en una aplicación de red. Producto: Android; ID de Android: A-141720095",
      },
   ],
   id: "CVE-2019-2215",
   lastModified: "2024-11-21T04:40:27.037",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 7.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-10-11T19:15:10.947",
   references: [
      {
         source: "security@android.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
      },
      {
         source: "security@android.com",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
      },
      {
         source: "security@android.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
      },
      {
         source: "security@android.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Oct/38",
      },
      {
         source: "security@android.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
      },
      {
         source: "security@android.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
      },
      {
         source: "security@android.com",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
      },
      {
         source: "security@android.com",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Nov/11",
      },
      {
         source: "security@android.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20191031-0005/",
      },
      {
         source: "security@android.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2019-10-01",
      },
      {
         source: "security@android.com",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4186-1/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2019/Oct/38",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Mailing List",
            "Patch",
            "Third Party Advisory",
         ],
         url: "https://seclists.org/bugtraq/2019/Nov/11",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://security.netapp.com/advisory/ntap-20191031-0005/",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://source.android.com/security/bulletin/2019-10-01",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
         ],
         url: "https://usn.ubuntu.com/4186-1/",
      },
   ],
   sourceIdentifier: "security@android.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-416",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2018-09-26 13:29
Modified
2024-11-21 04:12
Summary
Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.
Impacted products
Vendor Product Version
huawei agassi-l09_firmware ags-l09c100b257custc100d001
huawei agassi-l09_firmware ags-l09c170b253custc170d001
huawei agassi-l09_firmware ags-l09c199b251custc199d001
huawei agassi-l09_firmware ags-l09c229b003custc229d001
huawei agassi-l09 -
huawei agassi-w09_firmware ags-w09c100b257custc100d001
huawei agassi-w09_firmware ags-w09c128b252custc128d001
huawei agassi-w09_firmware ags-w09c170b252custc170d001
huawei agassi-w09_firmware ags-w09c229b251custc229d001
huawei agassi-w09_firmware ags-w09c331b003custc331d001
huawei agassi-w09_firmware ags-w09c794b001custc794d001
huawei agassi-w09 -
huawei baggio2-u01a_firmware bg2-u01c100b160custc100d001
huawei baggio2-u01a_firmware bg2-u01c170b160custc170d001
huawei baggio2-u01a_firmware bg2-u01c199b162custc199d001
huawei baggio2-u01a_firmware bg2-u01c209b160custc209d001
huawei baggio2-u01a_firmware bg2-u01c333b160custc333d001
huawei baggio2-u01a -
huawei bond-al00c_firmware bond-al00cc00b201
huawei bond-al00c -
huawei bond-al10b_firmware bond-al10bc00b201
huawei bond-al10b -
huawei bond-tl10b_firmware bond-tl10bc01b201
huawei bond-tl10b -
huawei bond-tl10c_firmware bond-tl10cc01b131
huawei bond-tl10c -
huawei haydn-l1jb_firmware hdn-l1jc137b068
huawei haydn-l1jb -
huawei kobe-l09a_firmware kob-l09c100b252custc100d001
huawei kobe-l09a_firmware kob-l09c209b002custc209d001
huawei kobe-l09a_firmware kob-l09c362b001custc362d001
huawei kobe-l09a -
huawei kobe-l09ahn_firmware kob-l09c233b226
huawei kobe-l09ahn -
huawei kobe-w09c_firmware kob-w09c128b251custc128d001
huawei kobe-w09c -
huawei lelandp-l22c_firmware 8.0.0.101_c675custc675d2
huawei lelandp-l22c -
huawei lelandp-l22d_firmware 8.0.0.101_c675custc675d2
huawei lelandp-l22d -
huawei rhone-al00_firmware rhone-al00c00b186
huawei rhone-al00 -
huawei selina-l02_firmware selina-l02c432b153
huawei selina-l02 -
huawei stanford-l09s_firmware stanford-l09sc432b183
huawei stanford-l09s -
huawei toronto-al00_firmware toronto-al00c00b223
huawei toronto-al00 -
huawei toronto-al00a_firmware toronto-al00ac00b223
huawei toronto-al00a -
huawei toronto-tl10_firmware toronto-tl10c01b223
huawei toronto-tl10 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c100b257custc100d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F827EDE-1276-46C4-B802-E0F6182636B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c170b253custc170d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0C51EE3-995E-4652-BF65-BD274B7C7848",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c199b251custc199d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "64663B9D-2047-46FE-B7BE-A10BD60D4DE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c229b003custc229d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6BAFF17-A6D9-48D7-BA9E-5896FA281A66",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:agassi-l09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3833712-95E8-4CC9-B55E-2F029E54C667",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c100b257custc100d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7349EFB-FE37-4584-BCA0-950C64F0BD4D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c128b252custc128d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDF5BA80-7832-40AD-A97E-E11A3F60E02F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c170b252custc170d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "123D3E09-7528-4572-9A6B-6052829E66DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c229b251custc229d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DB4C327-1C75-4222-A112-3F4B3A2E35C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c331b003custc331d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "95C1874D-290E-46EE-AB85-49BFB2C7A7AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c794b001custc794d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB392D3A-DAA3-410C-AC55-93494C2BCF51",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:agassi-w09:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0D90B4A-C25C-4DE3-9014-582F635E936F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c100b160custc100d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "E253E252-267B-4765-BFB7-37B2691878B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c170b160custc170d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94BECC2-AB1C-450F-8BC1-EB6B2BE7B61D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c199b162custc199d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "C77A32FD-9B24-493D-96CA-DCBE379ACC8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c209b160custc209d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "5322B262-F0E9-4C81-B4DF-B960A7BABE6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c333b160custc333d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "891DF843-1CAF-4CBC-9A11-7741BFB42943",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:baggio2-u01a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B44EB2A1-70E1-4056-AE68-88ED157416FE",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bond-al00c_firmware:bond-al00cc00b201:*:*:*:*:*:*:*",
                     matchCriteriaId: "19E20C9A-EAAD-45E8-A477-38EDE08040E1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bond-al00c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "276913D1-0C7C-41D1-8CD8-F23386B6441B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bond-al10b_firmware:bond-al10bc00b201:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA7D3DEB-35D9-4FD6-A0D3-0B8740E3C03E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bond-al10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C81E62E7-5286-4932-9498-FAF5E01D9C16",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bond-tl10b_firmware:bond-tl10bc01b201:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DD3CE44-E738-403E-95EF-0B4C85E1D453",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bond-tl10b:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58F076DF-3AD0-45FB-A98D-FCC5CCFD0464",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:bond-tl10c_firmware:bond-tl10cc01b131:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1F95540-3D6C-40E1-B8EC-1959DB5B25D3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:bond-tl10c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F07A146F-0FB6-4F24-9A62-81418471C437",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:haydn-l1jb_firmware:hdn-l1jc137b068:*:*:*:*:*:*:*",
                     matchCriteriaId: "0560310F-ACD9-425D-A69B-A421BEF93422",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:haydn-l1jb:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5FBEFB8E-593E-4FF2-B7B3-A35AEA88FBBF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c100b252custc100d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "4303A983-8A41-4534-B635-752A842C9818",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c209b002custc209d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B439486-8545-4EAC-AC83-1AA21C6BD2D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c362b001custc362d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "866E2099-F472-4757-A662-ED42891BA46F",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:kobe-l09a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A1B9004-674D-474C-B549-8F676E55C062",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:kobe-l09ahn_firmware:kob-l09c233b226:*:*:*:*:*:*:*",
                     matchCriteriaId: "35CF61AD-3D04-42D4-8981-31A1201D4DB6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:kobe-l09ahn:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C4B423-90C0-4A6E-A246-1A8BB7282AC8",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:kobe-w09c_firmware:kob-w09c128b251custc128d001:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAEEA7E6-354F-42FF-B2FA-778369FB758A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:kobe-w09c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D61E75D7-6AAB-4DFF-B5FE-5813511A6025",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22c_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CA04479-3205-4B8C-A718-310FEC6BB0C4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "80D7FA39-2EE4-49F8-9EF4-009304DB6108",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:lelandp-l22d_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF94D1CF-8781-4B2B-9D7F-8AF4ECFFB4AC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A956F54-5B4B-4103-BA45-88F8FF7D9FD7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:rhone-al00_firmware:rhone-al00c00b186:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A9B77C6-81F3-4F03-B2DA-ADA61E76E239",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4584E368-FDA6-41FD-923F-74A30E404967",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:selina-l02_firmware:selina-l02c432b153:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5033AC6-6E65-4D44-ACB3-5FA17CDFC5C6",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:selina-l02:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED60F5C-D4BF-4BE4-87F2-44B0F3490DE0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:stanford-l09s_firmware:stanford-l09sc432b183:*:*:*:*:*:*:*",
                     matchCriteriaId: "D520B64B-B051-45FE-BE6F-EBEBE9FE0777",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5091556-29A3-4781-A6CA-FB0BD03DEB01",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:toronto-al00_firmware:toronto-al00c00b223:*:*:*:*:*:*:*",
                     matchCriteriaId: "2FB76207-04DB-44A2-B06B-505E910D1440",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:toronto-al00:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "876D76BE-3687-4049-B3C9-7E1469E18CC0",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:toronto-al00a_firmware:toronto-al00ac00b223:*:*:*:*:*:*:*",
                     matchCriteriaId: "77565C14-795B-420E-B08C-FC6BDC3626E4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:toronto-al00a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A83D96D-0B5A-42F0-B967-BC27C5B14573",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:huawei:toronto-tl10_firmware:toronto-tl10c01b223:*:*:*:*:*:*:*",
                     matchCriteriaId: "E71D795C-A2FA-4416-BEE8-3C4EA801E186",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:huawei:toronto-tl10:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7401A6EC-6133-442D-A638-FF03132D0EF5",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.",
      },
      {
         lang: "es",
         value: "Algunos productos Huawei Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223 y Toronto-TL10 Toronto-TL10C01B223 tienen una vulnerabilidad de filtrado de información sensible. Un atacante puede engañar a un usuario para que instale una aplicación maliciosa para explotar esta vulnerabilidad. Debido a la verificación insuficiente de las entradas, su explotación exitosa puede provocar un filtrado de información sensible.",
      },
   ],
   id: "CVE-2018-7907",
   lastModified: "2024-11-21T04:12:57.170",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: true,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.8,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2018-09-26T13:29:00.527",
   references: [
      {
         source: "psirt@huawei.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
      },
   ],
   sourceIdentifier: "psirt@huawei.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-200",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-201809-1110
Vulnerability from variot

plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Agassi-L09 and Agassi-W09 are all smart products of Huawei. The attacker exploited this vulnerability by convincing the user to install a malicious application because the input was not fully verified. The successful exploitation of the vulnerability by an attacker can lead to the disclosure of sensitive information. The Huawei Agassi-L09 is a tablet device. The vulnerability is caused by the program's insufficient input validation. The following products and versions are affected: Huawei Agassi-L09 AGS-L09C100B257CUSTC100D001 Version, AGS-L09C170B253CUSTC170D001 Version, AGS-L09C199B251CUSTC199D001 Version, AGS-L09C229B003CUSTC229D001 Version; Agassi-W09 AGS-W09C100B257CUSTC100D001 Version, AGS-W09C128B252CUSTC128D001 Version, AGS-W09C170B252CUSTC170D001 Version, AGS -W09C229B251CUSTC229D001 Version, AGS-W09C331B003CUSTC331D001 Version, AGS-W09C794B001CUSTC794D001 Version; Baggio2-U01A BG2-U01C100B160CUSTC100D001 Version, BG2-U01C170B160CUSTC170D001 Version, BG2-U01C199B162CUSTC199D001 Version, BG2-U01C209B160CUSTC209D001 Version, BG2-U01C333B160CUSTC333D001 Version; Bond-AL00C Bond-AL00CC00B201 Version; Bond-AL10B Bond-AL10BC00B201 version; Bond-TL10B Bond-TL10BC01B201 version; Bond-TL10C Bond-TL10CC01B131 version; Haydn-L1JB HDN-L1JC137B068; Kobe-L09A

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1110",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "agassi-l09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-l09c100b257custc100d001",
         },
         {
            model: "agassi-l09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-l09c170b253custc170d001",
         },
         {
            model: "agassi-l09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-l09c199b251custc199d001",
         },
         {
            model: "agassi-l09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-l09c229b003custc229d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c100b257custc100d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c128b252custc128d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c170b252custc170d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c229b251custc229d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c331b003custc331d001",
         },
         {
            model: "agassi-w09",
            scope: "eq",
            trust: 2.4,
            vendor: "huawei",
            version: "ags-w09c794b001custc794d001",
         },
         {
            model: "baggio2-u01a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bg2-u01c100b160custc100d001",
         },
         {
            model: "baggio2-u01a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bg2-u01c170b160custc170d001",
         },
         {
            model: "baggio2-u01a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bg2-u01c199b162custc199d001",
         },
         {
            model: "baggio2-u01a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bg2-u01c209b160custc209d001",
         },
         {
            model: "baggio2-u01a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bg2-u01c333b160custc333d001",
         },
         {
            model: "bond-al00c",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bond-al00cc00b201",
         },
         {
            model: "bond-al10b",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bond-al10bc00b201",
         },
         {
            model: "bond-tl10b",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bond-tl10bc01b201",
         },
         {
            model: "bond-tl10c",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "bond-tl10cc01b131",
         },
         {
            model: "haydn-l1jb",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "hdn-l1jc137b068",
         },
         {
            model: "kobe-l09a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "kob-l09c100b252custc100d001",
         },
         {
            model: "kobe-l09a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "kob-l09c209b002custc209d001",
         },
         {
            model: "kobe-l09a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "kob-l09c362b001custc362d001",
         },
         {
            model: "kobe-l09ahn",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "kob-l09c233b226",
         },
         {
            model: "kobe-w09c",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "kob-w09c128b251custc128d001",
         },
         {
            model: "rhone-al00",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "rhone-al00c00b186",
         },
         {
            model: "selina-l02",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "selina-l02c432b153",
         },
         {
            model: "stanford-l09s",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "stanford-l09sc432b183",
         },
         {
            model: "toronto-al00",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "toronto-al00c00b223",
         },
         {
            model: "toronto-al00a",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "toronto-al00ac00b223",
         },
         {
            model: "toronto-tl10",
            scope: "eq",
            trust: 1.8,
            vendor: "huawei",
            version: "toronto-tl10c01b223",
         },
         {
            model: "lelandp-l22c",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.101_c675custc675d2",
         },
         {
            model: "lelandp-l22d",
            scope: "eq",
            trust: 1,
            vendor: "huawei",
            version: "8.0.0.101_c675custc675d2",
         },
         {
            model: "lelandp-l22c",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "8.0.0.101(c675custc675d2)",
         },
         {
            model: "lelandp-l22d",
            scope: "eq",
            trust: 0.8,
            vendor: "huawei",
            version: "8.0.0.101(c675custc675d2)",
         },
         {
            model: "agassi-l09 ags-l09c100b257custc100d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-l09 ags-l09c170b253custc170d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-l09 ags-l09c199b251custc199d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-l09 ags-l09c229b003custc229d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c100b257custc100d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c128b252custc128d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c170b252custc170d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c229b251custc229d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c331b003custc331d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "agassi-w09 ags-w09c794b001custc794d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "baggio2-u01a bg2-u01c100b160custc100d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "baggio2-u01a bg2-u01c170b160custc170d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "baggio2-u01a bg2-u01c199b162custc199d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "baggio2-u01a bg2-u01c209b160custc209d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "baggio2-u01a bg2-u01c333b160custc333d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bond-al00c bond-al00cc00b201",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bond-al10b bond-al10bc00b201",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bond-tl10b bond-tl10bc01b201",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "bond-tl10c bond-tl10cc01b131",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "haydn-l1jb hdn-l1jc137b068",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kobe-l09a kob-l09c100b252custc100d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kobe-l09a kob-l09c209b002custc209d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kobe-l09a kob-l09c362b001custc362d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kobe-l09ahn kob-l09c233b226",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "kobe-w09c kob-w09c128b251custc128d001",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lelandp-l22c 8.0.0.101",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "lelandp-l22d 8.0.0.101",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "rhone-al00 rhone-al00c00b186",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "selina-l02 selina-l02c432b153",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "stanford-l09s stanford-l09sc432b183",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "toronto-al00 toronto-al00c00b223",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "toronto-al00a toronto-al00ac00b223",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
         {
            model: "toronto-tl10 toronto-tl10c01b223",
            scope: null,
            trust: 0.6,
            vendor: "huawei",
            version: null,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c229b003custc229d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c170b253custc170d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c199b251custc199d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-l09_firmware:ags-l09c100b257custc100d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:agassi-l09:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c128b252custc128d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c100b257custc100d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c331b003custc331d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c170b252custc170d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c794b001custc794d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:agassi-w09_firmware:ags-w09c229b251custc229d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:agassi-w09:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c199b162custc199d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c170b160custc170d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c100b160custc100d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c333b160custc333d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:baggio2-u01a_firmware:bg2-u01c209b160custc209d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:baggio2-u01a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bond-al00c_firmware:bond-al00cc00b201:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bond-al00c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bond-al10b_firmware:bond-al10bc00b201:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bond-al10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bond-tl10b_firmware:bond-tl10bc01b201:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bond-tl10b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:bond-tl10c_firmware:bond-tl10cc01b131:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:bond-tl10c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:haydn-l1jb_firmware:hdn-l1jc137b068:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:haydn-l1jb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c100b252custc100d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c362b001custc362d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:kobe-l09a_firmware:kob-l09c209b002custc209d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:kobe-l09a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:kobe-l09ahn_firmware:kob-l09c233b226:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:kobe-l09ahn:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:kobe-w09c_firmware:kob-w09c128b251custc128d001:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:kobe-w09c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22c_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:lelandp-l22d_firmware:8.0.0.101_c675custc675d2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:lelandp-l22d:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:rhone-al00_firmware:rhone-al00c00b186:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:rhone-al00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:selina-l02_firmware:selina-l02c432b153:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:selina-l02:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:stanford-l09s_firmware:stanford-l09sc432b183:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:stanford-l09s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:toronto-al00_firmware:toronto-al00c00b223:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:toronto-al00:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:toronto-al00a_firmware:toronto-al00ac00b223:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:toronto-al00a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:huawei:toronto-tl10_firmware:toronto-tl10c01b223:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:huawei:toronto-tl10:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
      ],
   },
   cve: "CVE-2018-7907",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: true,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.3,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2018-7907",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 7.8,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "CNVD-2018-19589",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-137939",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2018-7907",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "Required",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2018-7907",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-19589",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201809-938",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-137939",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural Huawei The product contains an information disclosure vulnerability.Information may be obtained. Agassi-L09 and Agassi-W09 are all smart products of Huawei. The attacker exploited this vulnerability by convincing the user to install a malicious application because the input was not fully verified. The successful exploitation of the vulnerability by an attacker can lead to the disclosure of sensitive information. The Huawei Agassi-L09 is a tablet device. The vulnerability is caused by the program's insufficient input validation. The following products and versions are affected: Huawei Agassi-L09 AGS-L09C100B257CUSTC100D001 Version, AGS-L09C170B253CUSTC170D001 Version, AGS-L09C199B251CUSTC199D001 Version, AGS-L09C229B003CUSTC229D001 Version; Agassi-W09 AGS-W09C100B257CUSTC100D001 Version, AGS-W09C128B252CUSTC128D001 Version, AGS-W09C170B252CUSTC170D001 Version, AGS -W09C229B251CUSTC229D001 Version, AGS-W09C331B003CUSTC331D001 Version, AGS-W09C794B001CUSTC794D001 Version; Baggio2-U01A BG2-U01C100B160CUSTC100D001 Version, BG2-U01C170B160CUSTC170D001 Version, BG2-U01C199B162CUSTC199D001 Version, BG2-U01C209B160CUSTC209D001 Version, BG2-U01C333B160CUSTC333D001 Version; Bond-AL00C Bond-AL00CC00B201 Version;  Bond-AL10B Bond-AL10BC00B201 version; Bond-TL10B Bond-TL10BC01B201 version; Bond-TL10C Bond-TL10CC01B131 version; Haydn-L1JB HDN-L1JC137B068; Kobe-L09A",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
      ],
      trust: 1.35,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-7907",
            trust: 3.1,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   id: "VAR-201809-1110",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
      ],
      trust: 1.5535353545454544,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
      ],
   },
   last_update_date: "2023-12-18T12:01:16.896000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "huawei-sa-20180919-02-smartphone",
            trust: 0.8,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
         },
         {
            title: "Patches for various Huawei product information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/140897",
         },
         {
            title: "Multiple Huawei Product information disclosure vulnerability repair measures",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=85056",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-200",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.2,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20180919-02-smartphone-cn",
         },
         {
            trust: 1.1,
            url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-7907",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-7907",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-21T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            date: "2018-09-26T00:00:00",
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            date: "2018-12-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            date: "2018-09-26T13:29:00.527000",
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            date: "2018-09-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-21T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-19589",
         },
         {
            date: "2018-11-28T00:00:00",
            db: "VULHUB",
            id: "VHN-137939",
         },
         {
            date: "2018-12-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
         {
            date: "2018-11-28T16:52:19.113000",
            db: "NVD",
            id: "CVE-2018-7907",
         },
         {
            date: "2018-09-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Huawei Information disclosure vulnerability in products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-010986",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-938",
         },
      ],
      trust: 0.6,
   },
}

cve-2019-2215
Vulnerability from cvelistv5
Published
2019-10-11 18:16
Modified
2024-08-04 18:42
Severity ?
Summary
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Impacted products
Vendor Product Version
n/a Android Version: Kernel
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T18:42:50.933Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://source.android.com/security/bulletin/2019-10-01",
               },
               {
                  name: "20191018 CVE 2019-2215 Android Binder Use After Free",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2019/Oct/38",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://security.netapp.com/advisory/ntap-20191031-0005/",
               },
               {
                  name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "https://seclists.org/bugtraq/2019/Nov/11",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
               },
               {
                  name: "USN-4186-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "https://usn.ubuntu.com/4186-1/",
               },
               {
                  name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
               },
               {
                  name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Android",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "Kernel",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Elevation of privilege",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-02T19:06:43",
            orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
            shortName: "google_android",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://source.android.com/security/bulletin/2019-10-01",
            },
            {
               name: "20191018 CVE 2019-2215 Android Binder Use After Free",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2019/Oct/38",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://security.netapp.com/advisory/ntap-20191031-0005/",
            },
            {
               name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "https://seclists.org/bugtraq/2019/Nov/11",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
            },
            {
               name: "USN-4186-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "https://usn.ubuntu.com/4186-1/",
            },
            {
               name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
            },
            {
               name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "security@android.com",
               ID: "CVE-2019-2215",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Android",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Kernel",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Elevation of privilege",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://source.android.com/security/bulletin/2019-10-01",
                     refsource: "CONFIRM",
                     url: "https://source.android.com/security/bulletin/2019-10-01",
                  },
                  {
                     name: "20191018 CVE 2019-2215 Android Binder Use After Free",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2019/Oct/38",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html",
                  },
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en",
                  },
                  {
                     name: "https://security.netapp.com/advisory/ntap-20191031-0005/",
                     refsource: "CONFIRM",
                     url: "https://security.netapp.com/advisory/ntap-20191031-0005/",
                  },
                  {
                     name: "20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)",
                     refsource: "BUGTRAQ",
                     url: "https://seclists.org/bugtraq/2019/Nov/11",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html",
                  },
                  {
                     name: "USN-4186-1",
                     refsource: "UBUNTU",
                     url: "https://usn.ubuntu.com/4186-1/",
                  },
                  {
                     name: "[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html",
                  },
                  {
                     name: "[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update",
                     refsource: "MLIST",
                     url: "https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
      assignerShortName: "google_android",
      cveId: "CVE-2019-2215",
      datePublished: "2019-10-11T18:16:48",
      dateReserved: "2018-12-10T00:00:00",
      dateUpdated: "2024-08-04T18:42:50.933Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2018-7907
Vulnerability from cvelistv5
Published
2018-09-26 13:00
Modified
2024-08-05 06:37
Severity ?
Summary
Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. Agassi-L09,Agassi-W09,Baggio2-U01A,Bond-AL00C,Bond-AL10B,Bond-TL10B,Bond-TL10C,Haydn-L1JB,Kobe-L09A,Kobe-L09AHN,Kobe-W09C,LelandP-L22C,LelandP-L22D,Rhone-AL00,Selina-L02,Stanford-L09S,Toronto-AL00,Toronto-AL00A,Toronto-TL10 Version: Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001,Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001,Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001,Bond-AL00C Bond-AL00CC00B201,Bond-AL10B Bond-AL10BC00B201,Bond-TL10B Bond-TL10BC01B201,Bond-TL10C Bond-TL10CC01B131,Haydn-L1JB HDN-L1JC137B068,Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001,Kobe-L09AHN KOB-L09C233B226,Kobe-W09C KOB-W09C128B251CUSTC128D001,LelandP-L22C 8.0.0.101(C675CUSTC675D2),LelandP-L22D 8.0.0.101(C675CUSTC675D2),Rhone-AL00 Rhone-AL00C00B186,Selina-L02 Selina-L02C432B153,Stanford-L09S Stanford-L09SC432B183,Toronto-AL00 Toronto-AL00C00B223,Toronto-AL00A Toronto-AL00AC00 ...[truncated*]
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-05T06:37:59.653Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "Agassi-L09,Agassi-W09,Baggio2-U01A,Bond-AL00C,Bond-AL10B,Bond-TL10B,Bond-TL10C,Haydn-L1JB,Kobe-L09A,Kobe-L09AHN,Kobe-W09C,LelandP-L22C,LelandP-L22D,Rhone-AL00,Selina-L02,Stanford-L09S,Toronto-AL00,Toronto-AL00A,Toronto-TL10",
               vendor: "Huawei Technologies Co., Ltd.",
               versions: [
                  {
                     status: "affected",
                     version: "Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001,Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001,Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001,Bond-AL00C Bond-AL00CC00B201,Bond-AL10B Bond-AL10BC00B201,Bond-TL10B Bond-TL10BC01B201,Bond-TL10C Bond-TL10CC01B131,Haydn-L1JB HDN-L1JC137B068,Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001,Kobe-L09AHN KOB-L09C233B226,Kobe-W09C KOB-W09C128B251CUSTC128D001,LelandP-L22C 8.0.0.101(C675CUSTC675D2),LelandP-L22D 8.0.0.101(C675CUSTC675D2),Rhone-AL00 Rhone-AL00C00B186,Selina-L02 Selina-L02C432B153,Stanford-L09S Stanford-L09SC432B183,Toronto-AL00 Toronto-AL00C00B223,Toronto-AL00A Toronto-AL00AC00 ...[truncated*]",
                  },
               ],
            },
         ],
         datePublic: "2018-09-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "sensitive information leak",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-09-26T12:57:01",
            orgId: "25ac1063-e409-4190-8079-24548c77ea2e",
            shortName: "huawei",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
            },
         ],
         x_ConverterErrors: {
            version_name: {
               error: "version_name too long. Use array of versions to record more than one version.",
               message: "Truncated!",
            },
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@huawei.com",
               ID: "CVE-2018-7907",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Agassi-L09,Agassi-W09,Baggio2-U01A,Bond-AL00C,Bond-AL10B,Bond-TL10B,Bond-TL10C,Haydn-L1JB,Kobe-L09A,Kobe-L09AHN,Kobe-W09C,LelandP-L22C,LelandP-L22D,Rhone-AL00,Selina-L02,Stanford-L09S,Toronto-AL00,Toronto-AL00A,Toronto-TL10",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001,Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001,Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001,Bond-AL00C Bond-AL00CC00B201,Bond-AL10B Bond-AL10BC00B201,Bond-TL10B Bond-TL10BC01B201,Bond-TL10C Bond-TL10CC01B131,Haydn-L1JB HDN-L1JC137B068,Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001,Kobe-L09AHN KOB-L09C233B226,Kobe-W09C KOB-W09C128B251CUSTC128D001,LelandP-L22C 8.0.0.101(C675CUSTC675D2),LelandP-L22D 8.0.0.101(C675CUSTC675D2),Rhone-AL00 Rhone-AL00C00B186,Selina-L02 Selina-L02C432B153,Stanford-L09S Stanford-L09SC432B183,Toronto-AL00 Toronto-AL00C00B223,Toronto-AL00A Toronto-AL00AC00B223,Toronto-TL10 Toronto-TL10C01B223",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Huawei Technologies Co., Ltd.",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Some Huawei products Agassi-L09 AGS-L09C100B257CUSTC100D001, AGS-L09C170B253CUSTC170D001, AGS-L09C199B251CUSTC199D001, AGS-L09C229B003CUSTC229D001, Agassi-W09 AGS-W09C100B257CUSTC100D001, AGS-W09C128B252CUSTC128D001, AGS-W09C170B252CUSTC170D001, AGS-W09C229B251CUSTC229D001, AGS-W09C331B003CUSTC331D001, AGS-W09C794B001CUSTC794D001, Baggio2-U01A BG2-U01C100B160CUSTC100D001, BG2-U01C170B160CUSTC170D001, BG2-U01C199B162CUSTC199D001, BG2-U01C209B160CUSTC209D001, BG2-U01C333B160CUSTC333D001, Bond-AL00C Bond-AL00CC00B201, Bond-AL10B Bond-AL10BC00B201, Bond-TL10B Bond-TL10BC01B201, Bond-TL10C Bond-TL10CC01B131, Haydn-L1JB HDN-L1JC137B068, Kobe-L09A KOB-L09C100B252CUSTC100D001, KOB-L09C209B002CUSTC209D001, KOB-L09C362B001CUSTC362D001, Kobe-L09AHN KOB-L09C233B226, Kobe-W09C KOB-W09C128B251CUSTC128D001, LelandP-L22C 8.0.0.101(C675CUSTC675D2), LelandP-L22D 8.0.0.101(C675CUSTC675D2), Rhone-AL00 Rhone-AL00C00B186, Selina-L02 Selina-L02C432B153, Stanford-L09S Stanford-L09SC432B183, Toronto-AL00 Toronto-AL00C00B223, Toronto-AL00A Toronto-AL00AC00B223, Toronto-TL10 Toronto-TL10C01B223 have a sensitive information leak vulnerability. An attacker can trick a user to install a malicious application to exploit this vulnerability. Due to insufficient verification of the input, successful exploitation can cause sensitive information leak.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "sensitive information leak",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
                     refsource: "CONFIRM",
                     url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180919-02-smartphone-en",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e",
      assignerShortName: "huawei",
      cveId: "CVE-2018-7907",
      datePublished: "2018-09-26T13:00:00",
      dateReserved: "2018-03-09T00:00:00",
      dateUpdated: "2024-08-05T06:37:59.653Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}