CVE-2020-0022 (GCVE-0-2020-0022)

Vulnerability from cvelistv5 – Published: 2020-02-13 14:21 – Updated: 2024-08-04 05:47
VLAI?
Summary
In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715
CWE
  • Denial of service
Assigner
Impacted products
Vendor Product Version
n/a Android Affected: Android-8.0 Android-8.1 Android-9 Android-10
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "8.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "9.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "10.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "android",
            "vendor": "google",
            "versions": [
              {
                "status": "affected",
                "version": "8.1"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2020-0022",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-28T13:54:56.691635Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-682",
                "description": "CWE-682 Incorrect Calculation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-28T14:00:17.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:47:40.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://source.android.com/security/bulletin/2020-02-01"
          },
          {
            "name": "20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2020/Feb/10"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Android",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Android-8.0 Android-8.1 Android-9 Android-10"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-05-13T13:06:27",
        "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
        "shortName": "google_android"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://source.android.com/security/bulletin/2020-02-01"
        },
        {
          "name": "20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2020/Feb/10"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@android.com",
          "ID": "CVE-2020-0022",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Android",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Android-8.0 Android-8.1 Android-9 Android-10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://source.android.com/security/bulletin/2020-02-01",
              "refsource": "MISC",
              "url": "https://source.android.com/security/bulletin/2020-02-01"
            },
            {
              "name": "20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2020/Feb/10"
            },
            {
              "name": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
    "assignerShortName": "google_android",
    "cveId": "CVE-2020-0022",
    "datePublished": "2020-02-13T14:21:41",
    "dateReserved": "2019-10-17T00:00:00",
    "dateUpdated": "2024-08-04T05:47:40.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B578E383-0D77-4AC7-9C81-3F0B8C18E033\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DFAAD08-36DA-4C95-8200-C29FE5B6B854\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D558D965-FA70-4822-A770-419E73BA9ED3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.195\\\\(c00e74r3p8\\\\)\", \"matchCriteriaId\": \"75056A1A-9008-4A43-989D-5E5899A3994F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5322963-9375-4E4E-8119-895C224003AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.196\\\\(c185e7r2p4\\\\)\", \"matchCriteriaId\": \"3AAFCC24-8ADA-427B-84FE-1030AC3DE54D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2564E28F-EF08-4381-96D8-58BB7C8C0E0C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.195\\\\(c00e74r2p8\\\\)\", \"matchCriteriaId\": \"D9682CC9-50CA-45FB-ACE7-20F1D097FE00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FD3779B-F943-4B7E-BF82-AA4A051D02C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p_smart_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.193\\\\(c605e6r1p5t8\\\\)\", \"matchCriteriaId\": \"E28978C4-E7E5-4414-B442-92A4B533BB42\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64C4DE1A-ACBD-4DCA-8BAD-23AE6DF4025B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p_smart_2019_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.180\\\\(c185e3r4p1\\\\)\", \"matchCriteriaId\": \"E07EC714-4635-446B-87C7-CC5EE610B175\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B141C85-AFD2-4D7C-8B72-A065B3C905F6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.162\\\\(c00e156r1p4\\\\)\", \"matchCriteriaId\": \"22D5DBA0-EA94-4752-985C-DA7D555D7854\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7492911B-4242-4947-9DED-9F48FC0875CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.162\\\\(c00e156r1p4\\\\)\", \"matchCriteriaId\": \"138A6DBD-D3E3-47F8-ADF9-9ABD5C8AD397\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B315FBC-8BF9-4256-80F9-63EFF0806BEB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.190\\\\(c432e22r2p5\\\\)\", \"matchCriteriaId\": \"4D8897DB-732C-4B72-8A5C-F726805EFFB3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.195\\\\(c00e85r2p8\\\\)\", \"matchCriteriaId\": \"67F3CF79-07A3-476D-B30B-90E1852E48CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.290\\\\(c185e5r4p1\\\\)\", \"matchCriteriaId\": \"AD39CEB3-C282-4988-A642-58E41C8DDDED\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:y6_pro_2019_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.290\\\\(c636e5r3p1\\\\)\", \"matchCriteriaId\": \"CB0C0A35-FBB5-4492-BA94-4ADB1CE29C5E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B1F9660-41E0-4536-8032-57AD3E844A94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.264\\\\(c185e2r5p1t8\\\\)\", \"matchCriteriaId\": \"B9C331EF-4B78-4ECB-A99E-33FDE093ABEB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F48ABE15-BC87-4B02-8B39-94DA1DC96B92\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.338\\\\(c00e333r1p1t8\\\\)\", \"matchCriteriaId\": \"0F27CB3A-F773-48FB-9CAE-20FC93273D21\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF68FFB0-01F8-4937-8BF4-36866F02E9A8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:nova_lite_3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.322\\\\(c635e8r2p2\\\\)\", \"matchCriteriaId\": \"0938EC8C-17BB-48DE-A477-770948A20696\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EEA4B63-97F3-4BAB-B96E-4C36D9B0FDE5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1.0.291\\\\(c185e3r4p1\\\\)\", \"matchCriteriaId\": \"2128BDE5-AE3B-427E-8A25-F3065850206A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.183\\\\(c185e2r6p1\\\\)\", \"matchCriteriaId\": \"174DF865-A0F6-49DE-A465-9BA68799480A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7635502-0FD1-464E-8C64-1E8FF6235495\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.195\\\\(c636e3r4p3\\\\)\", \"matchCriteriaId\": \"AA8F4F9C-B02E-4C43-B4C4-485E2E38D3B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A55CF4F-8E86-419C-845B-CE60070620A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.203\\\\(c00e202r7p2\\\\)\", \"matchCriteriaId\": \"1D0ECA4E-CAFE-4637-95DC-B201B9549FC0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"488781A7-935E-4DD6-AD9D-A058067E10AD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_30_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.203\\\\(c00e202r7p2\\\\)\", \"matchCriteriaId\": \"F108CFD3-6A5F-40DE-A042-4528C43317D7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40B08C1D-444B-4C8B-B7F9-60CA9B2A8D50\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_30_pro_5g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.203\\\\(c00e202r7p2\\\\)\", \"matchCriteriaId\": \"BD56816C-6906-42DA-9BD3-70810C3BF658\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_30_pro_5g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7D6F9EF-ECC4-43BC-8AF4-BBAAF0F6940B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_30_5g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.0.0.203\\\\(c00e202r7p2\\\\)\", \"matchCriteriaId\": \"20D00959-B094-47B9-868B-21E905EF4401\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_30_5g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF4BEDDB-BDB9-4172-8B3E-6013AFDD8928\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715\"}, {\"lang\": \"es\", \"value\": \"En la funci\\u00f3n reassemble_and_dispatch del archivo packet_fragmenter.cc, es posible una escritura fuera de l\\u00edmites debido a un c\\u00e1lculo de l\\u00edmites incorrecto. Esto podr\\u00eda conllevar a una ejecuci\\u00f3n de c\\u00f3digo remota por medio del Bluetooth sin ser necesarios privilegios de ejecuci\\u00f3n adicionales. No es necesaria una interacci\\u00f3n del usuario para su explotaci\\u00f3n. Producto: Android, Versiones: Android-8.0 Android-8.1 Android-9 Android-10, ID de Android: A-143894715.\"}]",
      "id": "CVE-2020-0022",
      "lastModified": "2024-11-21T04:52:45.763",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 8.3, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 6.5, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2020-02-13T15:15:11.780",
      "references": "[{\"url\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"source\": \"security@android.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Feb/10\", \"source\": \"security@android.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"source\": \"security@android.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2020-02-01\", \"source\": \"security@android.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Feb/10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2020-02-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@android.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-682\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-682\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2020-0022\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2020-02-13T15:15:11.780\",\"lastModified\":\"2024-11-21T04:52:45.763\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715\"},{\"lang\":\"es\",\"value\":\"En la funci\u00f3n reassemble_and_dispatch del archivo packet_fragmenter.cc, es posible una escritura fuera de l\u00edmites debido a un c\u00e1lculo de l\u00edmites incorrecto. Esto podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo remota por medio del Bluetooth sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es necesaria una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: Android-8.0 Android-8.1 Android-9 Android-10, ID de Android: A-143894715.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":8.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":6.5,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-682\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-682\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B578E383-0D77-4AC7-9C81-3F0B8C18E033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DFAAD08-36DA-4C95-8200-C29FE5B6B854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D558D965-FA70-4822-A770-419E73BA9ED3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.195\\\\(c00e74r3p8\\\\)\",\"matchCriteriaId\":\"75056A1A-9008-4A43-989D-5E5899A3994F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5322963-9375-4E4E-8119-895C224003AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.196\\\\(c185e7r2p4\\\\)\",\"matchCriteriaId\":\"3AAFCC24-8ADA-427B-84FE-1030AC3DE54D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2564E28F-EF08-4381-96D8-58BB7C8C0E0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.195\\\\(c00e74r2p8\\\\)\",\"matchCriteriaId\":\"D9682CC9-50CA-45FB-ACE7-20F1D097FE00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD3779B-F943-4B7E-BF82-AA4A051D02C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p_smart_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.193\\\\(c605e6r1p5t8\\\\)\",\"matchCriteriaId\":\"E28978C4-E7E5-4414-B442-92A4B533BB42\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p_smart:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64C4DE1A-ACBD-4DCA-8BAD-23AE6DF4025B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p_smart_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.180\\\\(c185e3r4p1\\\\)\",\"matchCriteriaId\":\"E07EC714-4635-446B-87C7-CC5EE610B175\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p_smart_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B141C85-AFD2-4D7C-8B72-A065B3C905F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.162\\\\(c00e156r1p4\\\\)\",\"matchCriteriaId\":\"22D5DBA0-EA94-4752-985C-DA7D555D7854\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7492911B-4242-4947-9DED-9F48FC0875CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.162\\\\(c00e156r1p4\\\\)\",\"matchCriteriaId\":\"138A6DBD-D3E3-47F8-ADF9-9ABD5C8AD397\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B315FBC-8BF9-4256-80F9-63EFF0806BEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.190\\\\(c432e22r2p5\\\\)\",\"matchCriteriaId\":\"4D8897DB-732C-4B72-8A5C-F726805EFFB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.195\\\\(c00e85r2p8\\\\)\",\"matchCriteriaId\":\"67F3CF79-07A3-476D-B30B-90E1852E48CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.290\\\\(c185e5r4p1\\\\)\",\"matchCriteriaId\":\"AD39CEB3-C282-4988-A642-58E41C8DDDED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_pro_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.290\\\\(c636e5r3p1\\\\)\",\"matchCriteriaId\":\"CB0C0A35-FBB5-4492-BA94-4ADB1CE29C5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_pro_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B1F9660-41E0-4536-8032-57AD3E844A94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.264\\\\(c185e2r5p1t8\\\\)\",\"matchCriteriaId\":\"B9C331EF-4B78-4ECB-A99E-33FDE093ABEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F48ABE15-BC87-4B02-8B39-94DA1DC96B92\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.338\\\\(c00e333r1p1t8\\\\)\",\"matchCriteriaId\":\"0F27CB3A-F773-48FB-9CAE-20FC93273D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF68FFB0-01F8-4937-8BF4-36866F02E9A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nova_lite_3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.322\\\\(c635e8r2p2\\\\)\",\"matchCriteriaId\":\"0938EC8C-17BB-48DE-A477-770948A20696\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEA4B63-97F3-4BAB-B96E-4C36D9B0FDE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.291\\\\(c185e3r4p1\\\\)\",\"matchCriteriaId\":\"2128BDE5-AE3B-427E-8A25-F3065850206A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.183\\\\(c185e2r6p1\\\\)\",\"matchCriteriaId\":\"174DF865-A0F6-49DE-A465-9BA68799480A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7635502-0FD1-464E-8C64-1E8FF6235495\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.195\\\\(c636e3r4p3\\\\)\",\"matchCriteriaId\":\"AA8F4F9C-B02E-4C43-B4C4-485E2E38D3B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A55CF4F-8E86-419C-845B-CE60070620A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_30_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.203\\\\(c00e202r7p2\\\\)\",\"matchCriteriaId\":\"1D0ECA4E-CAFE-4637-95DC-B201B9549FC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_30_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"488781A7-935E-4DD6-AD9D-A058067E10AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.203\\\\(c00e202r7p2\\\\)\",\"matchCriteriaId\":\"F108CFD3-6A5F-40DE-A042-4528C43317D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B08C1D-444B-4C8B-B7F9-60CA9B2A8D50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_30_pro_5g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.203\\\\(c00e202r7p2\\\\)\",\"matchCriteriaId\":\"BD56816C-6906-42DA-9BD3-70810C3BF658\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_30_pro_5g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7D6F9EF-ECC4-43BC-8AF4-BBAAF0F6940B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_30_5g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.203\\\\(c00e202r7p2\\\\)\",\"matchCriteriaId\":\"20D00959-B094-47B9-868B-21E905EF4401\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_30_5g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4BEDDB-BDB9-4172-8B3E-6013AFDD8928\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\",\"source\":\"security@android.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Feb/10\",\"source\":\"security@android.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\",\"source\":\"security@android.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2020-02-01\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2020/Feb/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2020-02-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://source.android.com/security/bulletin/2020-02-01\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Feb/10\", \"name\": \"20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:47:40.847Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-0022\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-28T13:54:56.691635Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"android\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"android\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"android\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*\"], \"vendor\": \"google\", \"product\": \"android\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.1\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-682\", \"description\": \"CWE-682 Incorrect Calculation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-28T13:54:52.754Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Android\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android-8.0 Android-8.1 Android-9 Android-10\"}]}], \"references\": [{\"url\": \"https://source.android.com/security/bulletin/2020-02-01\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Feb/10\", \"name\": \"20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Denial of service\"}]}], \"providerMetadata\": {\"orgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"shortName\": \"google_android\", \"dateUpdated\": \"2020-05-13T13:06:27\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Android-8.0 Android-8.1 Android-9 Android-10\"}]}, \"product_name\": \"Android\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://source.android.com/security/bulletin/2020-02-01\", \"name\": \"https://source.android.com/security/bulletin/2020-02-01\", \"refsource\": \"MISC\"}, {\"url\": \"http://seclists.org/fulldisclosure/2020/Feb/10\", \"name\": \"20200214 Re: [FD] Critical Bluetooth Vulnerability in Android (CVE-2020-0022) - BlueFrag\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"name\": \"http://packetstormsecurity.com/files/156891/Android-Bluetooth-Remote-Denial-Of-Service.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"name\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-03-smartphone-en\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Denial of service\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-0022\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@android.com\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2020-0022\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-04T05:47:40.847Z\", \"dateReserved\": \"2019-10-17T00:00:00\", \"assignerOrgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"datePublished\": \"2020-02-13T14:21:41\", \"assignerShortName\": \"google_android\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…