CVE-2021-22327 (GCVE-0-2021-22327)

Vulnerability from cvelistv5 – Published: 2021-04-28 11:19 – Updated: 2024-08-03 18:37
VLAI?
Summary
There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4).
Severity ?
No CVSS data available.
CWE
  • Arbitrary Memory Write
Assigner
References
Impacted products
Vendor Product Version
n/a HUAWEI P30 Affected: 10.0.0.186(C10E7R5P1),10.0.0.186(C461E4R3P1),10.0.0.188(C00E85R2P11),10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3),10.0.0.190(C185E4R7P1),10.0.0.190(C431E22R2P5),10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3),10.0.0.190(C636E4R3P4),10.0.0.192(C635E3R2P4)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:37:18.486Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "HUAWEI P30",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.0.186(C10E7R5P1),10.0.0.186(C461E4R3P1),10.0.0.188(C00E85R2P11),10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3),10.0.0.190(C185E4R7P1),10.0.0.190(C431E22R2P5),10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3),10.0.0.190(C636E4R3P4),10.0.0.192(C635E3R2P4)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Memory Write",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-28T11:19:52",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "ID": "CVE-2021-22327",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "HUAWEI P30",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "10.0.0.186(C10E7R5P1),10.0.0.186(C461E4R3P1),10.0.0.188(C00E85R2P11),10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3),10.0.0.190(C185E4R7P1),10.0.0.190(C431E22R2P5),10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3),10.0.0.190(C636E4R3P4),10.0.0.192(C635E3R2P4)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Memory Write"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en",
              "refsource": "MISC",
              "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2021-22327",
    "datePublished": "2021-04-28T11:19:52",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-08-03T18:37:18.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\\\(c10e7r5p1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CCB8EA7-C9E7-4855-B203-B0E92629E96C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\\\(c461e4r3p1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8BB4F42-422C-4C7A-A1E0-4F7088D923C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c00e85r2p11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1C06A19-8AE9-4184-97C1-62C370614CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c01e88r2p11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8FE7760-CE52-4B86-B016-EE2C1E91C128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c605e19r1p3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED9377B1-039C-4563-AE8D-53B821C72D2C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c185e4r7p1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A322538-FDA4-4AB4-AAB5-4055347676FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c431e22r2p5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79845BD4-2B20-44CE-A78C-C666153D76C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c432e22r2p5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F51F54B-3D16-4568-BFA8-D5FBCA8F10E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c605e19r1p3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06EDAE0B-D4A0-4E41-BF32-487DA170ACEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c636e4r3p4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36B2746C-D296-4AF5-BFE9-B942802C7750\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:huawei:p30_firmware:10.0.0.192\\\\(c635e3r2p4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5901BC9-9EC0-4FFA-A597-3E8C8E858389\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4).\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de escritura de memoria arbitraria en el tel\\u00e9fono inteligente Huawei cuando se procesa el an\\u00e1lisis de archivos.\u0026#xa0;Debido a una validaci\\u00f3n insuficiente de los archivos de entrada, una explotaci\\u00f3n con \\u00e9xito podr\\u00eda causar que determinados servicios sean anormales.\u0026#xa0;Las versiones de productos afectados incluyen: HUAWEI P30 versiones 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11), 10.0.0.188(C605E19R1P3), 10.0.0.188(C605E19R1P3), 10.0.0.190 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5), 10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4)\"}]",
      "id": "CVE-2021-22327",
      "lastModified": "2024-11-21T05:49:55.117",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2021-04-28T12:15:08.223",
      "references": "[{\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en\", \"source\": \"psirt@huawei.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@huawei.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-22327\",\"sourceIdentifier\":\"psirt@huawei.com\",\"published\":\"2021-04-28T12:15:08.223\",\"lastModified\":\"2024-11-21T05:49:55.117\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is an arbitrary memory write vulnerability in Huawei smart phone when processing file parsing. Due to insufficient validation of the input files, successful exploit could cause certain service abnormal. Affected product versions include:HUAWEI P30 versions 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11),10.0.0.188(C605E19R1P3), 10.0.0.190(C185E4R7P1), 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5),10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4).\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de escritura de memoria arbitraria en el tel\u00e9fono inteligente Huawei cuando se procesa el an\u00e1lisis de archivos.\u0026#xa0;Debido a una validaci\u00f3n insuficiente de los archivos de entrada, una explotaci\u00f3n con \u00e9xito podr\u00eda causar que determinados servicios sean anormales.\u0026#xa0;Las versiones de productos afectados incluyen: HUAWEI P30 versiones 10.0.0.186(C10E7R5P1), 10.0.0.186(C461E4R3P1), 10.0.0.188(C00E85R2P11), 10.0.0.188(C01E88R2P11), 10.0.0.188(C605E19R1P3), 10.0.0.188(C605E19R1P3), 10.0.0.190 10.0.0.190(C431E22R2P5), 10.0.0.190(C432E22R2P5), 10.0.0.190(C605E19R1P3), 10.0.0.190(C636E4R3P4), 10.0.0.192(C635E3R2P4)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\\\(c10e7r5p1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CCB8EA7-C9E7-4855-B203-B0E92629E96C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.186\\\\(c461e4r3p1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8BB4F42-422C-4C7A-A1E0-4F7088D923C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c00e85r2p11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C06A19-8AE9-4184-97C1-62C370614CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c01e88r2p11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8FE7760-CE52-4B86-B016-EE2C1E91C128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.188\\\\(c605e19r1p3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9377B1-039C-4563-AE8D-53B821C72D2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c185e4r7p1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A322538-FDA4-4AB4-AAB5-4055347676FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c431e22r2p5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79845BD4-2B20-44CE-A78C-C666153D76C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c432e22r2p5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F51F54B-3D16-4568-BFA8-D5FBCA8F10E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c605e19r1p3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EDAE0B-D4A0-4E41-BF32-487DA170ACEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.190\\\\(c636e4r3p4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B2746C-D296-4AF5-BFE9-B942802C7750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:p30_firmware:10.0.0.192\\\\(c635e3r2p4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5901BC9-9EC0-4FFA-A597-3E8C8E858389\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21EE286C-8111-4F59-8CF1-13C68EA76B21\"}]}]}],\"references\":[{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en\",\"source\":\"psirt@huawei.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210331-01-smartphone-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…