CVE-2019-5230 (GCVE-0-2019-5230)
Vulnerability from cvelistv5 – Published: 2019-11-12 23:05 – Updated: 2024-08-04 19:47
VLAI?
Summary
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information.
Severity ?
No CVSS data available.
CWE
- Improper Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | P20 Pro, P20, Mate RS |
Affected:
Versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:47:56.787Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "P20 Pro, P20, Mate RS",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Improper Validation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-12T23:05:04",
"orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"shortName": "huawei"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@huawei.com",
"ID": "CVE-2019-5230",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "P20 Pro, P20, Mate RS",
"version": {
"version_data": [
{
"version_value": "Versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), Versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Validation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en",
"refsource": "MISC",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
"assignerShortName": "huawei",
"cveId": "CVE-2019-5230",
"datePublished": "2019-11-12T23:05:04",
"dateReserved": "2019-01-04T00:00:00",
"dateUpdated": "2024-08-04T19:47:56.787Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"charlotte-al00a_9.1.0.321\\\\(c00e320r1p1t8\\\\)\", \"matchCriteriaId\": \"ADC5B864-4A63-44FE-9CC8-53A6E679A889\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B315FBC-8BF9-4256-80F9-63EFF0806BEB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"emily-al00a_9.1.0.321\\\\(c00e320r1p1t8\\\\)\", \"matchCriteriaId\": \"1C0F4F57-86D7-4959-B118-4617135CF30B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7492911B-4242-4947-9DED-9F48FC0875CD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_rs_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"neo-al00d_neo-al00_9.1.0.321\\\\(c786e320r1p1t8\\\\)\", \"matchCriteriaId\": \"73613E67-3C68-4774-8C1B-A170016455B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBDD07EB-20AB-4E6F-B009-60A2C08C3B1C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information.\"}, {\"lang\": \"es\", \"value\": \"Tel\\u00e9fonos Inteligentes P20 Pro, P20, Mate RS con versiones anteriores a Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versiones anteriores a Emily-AL00A 9.1.0.321(C00E320R1P1T8), versiones anteriores a NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8), presentan una vulnerabilidad de comprobaci\\u00f3n inapropiada. El sistema no realiza una comprobaci\\u00f3n apropiada de ciertos modelos de entrada, un atacante podr\\u00eda enga\\u00f1ar al usuario para que instale una aplicaci\\u00f3n maliciosa y luego dise\\u00f1e un modelo malformado, Una explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitirle al atacante obtener y manipular determinada informaci\\u00f3n de datos de salida.\"}]",
"id": "CVE-2019-5230",
"lastModified": "2024-11-21T04:44:34.113",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-11-13T00:15:11.463",
"references": "[{\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-5230\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2019-11-13T00:15:11.463\",\"lastModified\":\"2024-11-21T04:44:34.113\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform a properly validation of certain input models, an attacker could trick the user to install a malicious application then craft a malformed model, successful exploit could allow the attacker to get and tamper certain output data information.\"},{\"lang\":\"es\",\"value\":\"Tel\u00e9fonos Inteligentes P20 Pro, P20, Mate RS con versiones anteriores a Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versiones anteriores a Emily-AL00A 9.1.0.321(C00E320R1P1T8), versiones anteriores a NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8), presentan una vulnerabilidad de comprobaci\u00f3n inapropiada. El sistema no realiza una comprobaci\u00f3n apropiada de ciertos modelos de entrada, un atacante podr\u00eda enga\u00f1ar al usuario para que instale una aplicaci\u00f3n maliciosa y luego dise\u00f1e un modelo malformado, Una explotaci\u00f3n con \u00e9xito podr\u00eda permitirle al atacante obtener y manipular determinada informaci\u00f3n de datos de salida.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"charlotte-al00a_9.1.0.321\\\\(c00e320r1p1t8\\\\)\",\"matchCriteriaId\":\"ADC5B864-4A63-44FE-9CC8-53A6E679A889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B315FBC-8BF9-4256-80F9-63EFF0806BEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"emily-al00a_9.1.0.321\\\\(c00e320r1p1t8\\\\)\",\"matchCriteriaId\":\"1C0F4F57-86D7-4959-B118-4617135CF30B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7492911B-4242-4947-9DED-9F48FC0875CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_rs_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"neo-al00d_neo-al00_9.1.0.321\\\\(c786e320r1p1t8\\\\)\",\"matchCriteriaId\":\"73613E67-3C68-4774-8C1B-A170016455B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_rs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBDD07EB-20AB-4E6F-B009-60A2C08C3B1C\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190925-03-smartphone-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…