cve-2020-9081
Vulnerability from cvelistv5
Published
2024-12-27 09:34
Modified
2024-12-27 16:08
Severity ?
EPSS score ?
Summary
There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)
This vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | HUAWEI Mate 20 |
Version: Versions earlier than 10.1.0.160(C00E160R3P8) Version: Versions earlier than 10.1.0.160(C01E160R2P8) |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2020-9081", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-27T16:07:50.855336Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-27T16:08:00.642Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "HUAWEI Mate 20", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R3P8)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.160(C01E160R2P8)" } ] }, { "defaultStatus": "unaffected", "product": "HUAWEI P30", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R2P11)" } ] }, { "defaultStatus": "unaffected", "product": "HUAWEI P30 Pro", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R2P8)" }, { "status": "affected", "version": "Versions earlier than 10.1.0.160(C01E160R2P8)" } ] }, { "defaultStatus": "unaffected", "product": "Princeton-AL10D", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R2P11)" } ] }, { "defaultStatus": "unaffected", "product": "Yale-AL00A", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R8P12)" } ] }, { "defaultStatus": "unaffected", "product": "Yale-AL50A", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.88(C00E88R8P1)" } ] }, { "defaultStatus": "unaffected", "product": "YaleP-AL10B", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "Versions earlier than 10.1.0.160(C00E160R8P12)" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThere is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.\u003c/p\u003e" } ], "value": "There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\n\n\n\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-27T09:34:40.332Z", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "url": "https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200826-15-smartphone-en" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9081", "datePublished": "2024-12-27T09:34:40.332Z", "dateReserved": "2020-02-18T00:00:00.000Z", "dateUpdated": "2024-12-27T16:08:00.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r3p8\\\\)\", \"matchCriteriaId\": \"165A8717-DD86-4BC0-AB3C-BD7F92DF68CD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5322963-9375-4E4E-8119-895C224003AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r2p11\\\\)\", \"matchCriteriaId\": \"29C7558A-D8B6-4773-A14D-38EDFFD96E5E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r2p8\\\\)\", \"matchCriteriaId\": \"4818ECF7-B4D4-4AF4-9DAA-FE08F56B26FC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:princeton-al10d_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r2p11\\\\)\", \"matchCriteriaId\": \"B8C262C7-C463-4F74-8F6B-6BF9B4FDCBCF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11E6B825-CA55-4BEC-8279-3F33F7CC93EE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r8p12\\\\)\", \"matchCriteriaId\": \"4BDC1976-E07B-4464-84DB-EACAE30D97E5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"562D05D2-CC9E-4973-9E8D-B40C0ED6C721\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:yale-al50a_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.88\\\\(c00e88r8p1\\\\)\", \"matchCriteriaId\": \"752648AA-54F7-40EF-AC48-BAD6F9F31579\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:yale-al50a:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77360A45-7501-4243-812A-D8C3403D1F03\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c00e160r8p12\\\\)\", \"matchCriteriaId\": \"A68AFA26-2D0F-4896-AB42-4E3327935F9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7D81385-913B-4A38-A712-41CAE7B78DF4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c01e160r2p8\\\\)\", \"matchCriteriaId\": \"8E2B578A-E6CE-413D-890B-20AC7EAEE59C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5322963-9375-4E4E-8119-895C224003AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.1.0.160\\\\(c01e160r2p8\\\\)\", \"matchCriteriaId\": \"62637079-D8B3-4D71-8686-250C289C2957\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\\n\\n\\n\\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.\"}, {\"lang\": \"es\", \"value\": \"Existe una vulnerabilidad de autorizaci\\u00f3n indebida en algunos tel\\u00e9fonos inteligentes Huawei. Un atacante podr\\u00eda realizar una serie de operaciones en un modo espec\\u00edfico para explotar esta vulnerabilidad. Si lo hace con \\u00e9xito, podr\\u00eda permitir al atacante eludir el bloqueo de la aplicaci\\u00f3n. (ID de vulnerabilidad: HWPSIRT-2019-12144) A esta vulnerabilidad se le ha asignado un ID de vulnerabilidad y exposici\\u00f3n com\\u00fan (CVE): CVE-2020-9081.\"}]", "id": "CVE-2020-9081", "lastModified": "2025-01-10T20:37:44.267", "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@huawei.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 3.5, \"baseSeverity\": \"LOW\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}]}", "published": "2024-12-27T10:15:10.937", "references": "[{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200826-15-smartphone-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Analyzed", "weaknesses": "[{\"source\": \"psirt@huawei.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-285\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-863\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2020-9081\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2024-12-27T10:15:10.937\",\"lastModified\":\"2025-01-10T20:37:44.267\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\\n\\n\\n\\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.\"},{\"lang\":\"es\",\"value\":\"Existe una vulnerabilidad de autorizaci\u00f3n indebida en algunos tel\u00e9fonos inteligentes Huawei. Un atacante podr\u00eda realizar una serie de operaciones en un modo espec\u00edfico para explotar esta vulnerabilidad. Si lo hace con \u00e9xito, podr\u00eda permitir al atacante eludir el bloqueo de la aplicaci\u00f3n. (ID de vulnerabilidad: HWPSIRT-2019-12144) A esta vulnerabilidad se le ha asignado un ID de vulnerabilidad y exposici\u00f3n com\u00fan (CVE): CVE-2020-9081.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@huawei.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@huawei.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r3p8\\\\)\",\"matchCriteriaId\":\"165A8717-DD86-4BC0-AB3C-BD7F92DF68CD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5322963-9375-4E4E-8119-895C224003AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r2p11\\\\)\",\"matchCriteriaId\":\"29C7558A-D8B6-4773-A14D-38EDFFD96E5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r2p8\\\\)\",\"matchCriteriaId\":\"4818ECF7-B4D4-4AF4-9DAA-FE08F56B26FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:princeton-al10d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r2p11\\\\)\",\"matchCriteriaId\":\"B8C262C7-C463-4F74-8F6B-6BF9B4FDCBCF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:princeton-al10d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E6B825-CA55-4BEC-8279-3F33F7CC93EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r8p12\\\\)\",\"matchCriteriaId\":\"4BDC1976-E07B-4464-84DB-EACAE30D97E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562D05D2-CC9E-4973-9E8D-B40C0ED6C721\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yale-al50a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.88\\\\(c00e88r8p1\\\\)\",\"matchCriteriaId\":\"752648AA-54F7-40EF-AC48-BAD6F9F31579\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yale-al50a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77360A45-7501-4243-812A-D8C3403D1F03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c00e160r8p12\\\\)\",\"matchCriteriaId\":\"A68AFA26-2D0F-4896-AB42-4E3327935F9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D81385-913B-4A38-A712-41CAE7B78DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c01e160r2p8\\\\)\",\"matchCriteriaId\":\"8E2B578A-E6CE-413D-890B-20AC7EAEE59C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5322963-9375-4E4E-8119-895C224003AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.160\\\\(c01e160r2p8\\\\)\",\"matchCriteriaId\":\"62637079-D8B3-4D71-8686-250C289C2957\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DB671DB-CB5B-46E0-B221-722D051184DE\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200826-15-smartphone-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-9081\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-27T16:07:50.855336Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-27T16:07:55.781Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.5, \"attackVector\": \"PHYSICAL\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Huawei\", \"product\": \"HUAWEI Mate 20\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R3P8)\"}, {\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C01E160R2P8)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"HUAWEI P30\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R2P11)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"HUAWEI P30 Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R2P8)\"}, {\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C01E160R2P8)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"Princeton-AL10D\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R2P11)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"Yale-AL00A\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R8P12)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"Yale-AL50A\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.88(C00E88R8P1)\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Huawei\", \"product\": \"YaleP-AL10B\", \"versions\": [{\"status\": \"affected\", \"version\": \"Versions earlier than 10.1.0.160(C00E160R8P12)\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/2020/huawei-sa-20200826-15-smartphone-en\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"There is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\\n\\n\\n\\nThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThere is an improper authorization vulnerability in some Huawei smartphones. An attacker could perform a series of operation in specific mode to exploit this vulnerability. Successful exploit could allow the attacker to bypass app lock. (Vulnerability ID: HWPSIRT-2019-12144)\u003c/p\u003e\u003cp\u003e\u003c/p\u003e\u003cp\u003eThis vulnerability has been assigned a Common Vulnerabilities and Exposures (CVE) ID: CVE-2020-9081.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285 Improper Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"25ac1063-e409-4190-8079-24548c77ea2e\", \"shortName\": \"huawei\", \"dateUpdated\": \"2024-12-27T09:34:40.332Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2020-9081\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-27T16:08:00.642Z\", \"dateReserved\": \"2020-02-18T00:00:00.000Z\", \"assignerOrgId\": \"25ac1063-e409-4190-8079-24548c77ea2e\", \"datePublished\": \"2024-12-27T09:34:40.332Z\", \"assignerShortName\": \"huawei\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.