cve-2019-5220
Vulnerability from cvelistv5
Published
2019-07-10 17:38
Modified
2024-08-04 19:47
Severity ?
Summary
There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2).
Impacted products
Vendor Product Version
Huawei Mate 20 Version: Versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1)
Huawei Honor Magic 2 Version: Versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.819Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Mate 20 X",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1)"
            }
          ]
        },
        {
          "product": "Mate 20",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1)"
            }
          ]
        },
        {
          "product": "Honor Magic 2",
          "vendor": "Huawei",
          "versions": [
            {
              "status": "affected",
              "version": "Versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "FRP Bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-10T17:38:15",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2019-5220",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Mate 20 X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Mate 20",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Honor Magic 2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "FRP Bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en",
              "refsource": "CONFIRM",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2019-5220",
    "datePublished": "2019-07-10T17:38:15",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.819Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"ever-al00b_9.0.0.200\\\\(c00e200r2p1\\\\)\", \"matchCriteriaId\": \"6E9B173D-4E18-4147-8900-9F236A01F701\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FD3779B-F943-4B7E-BF82-AA4A051D02C8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"hima-al00b\\\\/hima-tl00b_9.0.0.200\\\\(c00e200r2p1\\\\)\", \"matchCriteriaId\": \"014B53F4-1EF7-4C2C-BED1-B0D1ECC7BFC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5322963-9375-4E4E-8119-895C224003AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:honor_magic_2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"tony-al00b\\\\/tony-tl00b_9.0.0.182\\\\(c00e180r2p2\\\\)\", \"matchCriteriaId\": \"9385366D-823E-48E6-9A90-63E90D93C178\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:honor_magic_2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F3A0DA8-F39F-4343-856C-4BCDFB874DD2\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2).\"}, {\"lang\": \"es\", \"value\": \"Hay una vulnerabilidad de omisi\\u00f3n de la protecci\\u00f3n Factory Reset Protection (FRP) en varios tel\\u00e9fonos inteligentes. El sistema no comprueba de manera suficiente el permiso, un atacante podr\\u00eda realizar una determinada operaci\\u00f3n en cierto paso del asistente de configuraci\\u00f3n. La explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitir al atacante omitir la protecci\\u00f3n FRP. Productos afectados: Mate 20 X, versiones anteriores a Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versiones anteriores a Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versiones anteriores a Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)\"}]",
      "id": "CVE-2019-5220",
      "lastModified": "2024-11-21T04:44:32.850",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 4.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-07-10T18:15:11.067",
      "references": "[{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-5220\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-07-10T18:15:11.067\",\"lastModified\":\"2024-11-21T04:44:32.850\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker could do a certain operation on certain step of setup wizard. Successful exploit could allow the attacker bypass the FRP protection. Affected products: Mate 20 X, versions earlier than Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versions earlier than Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versions earlier than Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2).\"},{\"lang\":\"es\",\"value\":\"Hay una vulnerabilidad de omisi\u00f3n de la protecci\u00f3n Factory Reset Protection (FRP) en varios tel\u00e9fonos inteligentes. El sistema no comprueba de manera suficiente el permiso, un atacante podr\u00eda realizar una determinada operaci\u00f3n en cierto paso del asistente de configuraci\u00f3n. La explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante omitir la protecci\u00f3n FRP. Productos afectados: Mate 20 X, versiones anteriores a Ever-AL00B 9.0.0.200(C00E200R2P1); Mate 20, versiones anteriores a Hima-AL00B/Hima-TL00B 9.0.0.200(C00E200R2P1); Honor Magic 2, versiones anteriores a Tony-AL00B/Tony-TL00B 9.0.0.182(C00E180R2P2)\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"ever-al00b_9.0.0.200\\\\(c00e200r2p1\\\\)\",\"matchCriteriaId\":\"6E9B173D-4E18-4147-8900-9F236A01F701\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD3779B-F943-4B7E-BF82-AA4A051D02C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"hima-al00b\\\\/hima-tl00b_9.0.0.200\\\\(c00e200r2p1\\\\)\",\"matchCriteriaId\":\"014B53F4-1EF7-4C2C-BED1-B0D1ECC7BFC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5322963-9375-4E4E-8119-895C224003AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_magic_2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"tony-al00b\\\\/tony-tl00b_9.0.0.182\\\\(c00e180r2p2\\\\)\",\"matchCriteriaId\":\"9385366D-823E-48E6-9A90-63E90D93C178\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_magic_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3A0DA8-F39F-4343-856C-4BCDFB874DD2\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190626-01-frp-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.