var-202004-0961
Vulnerability from variot
HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.188(C00E74R3P8) have an improper authorization vulnerability. The software does not properly restrict certain user's modification of certain configuration file, successful exploit could allow the attacker to bypass app lock after a series of operation in ADB mode. Huawei Mate 20 is a smart phone of the Chinese company Huawei.
Before Huawei Mate 20 10.0.0.188 (C00E74R3P8), there was an access control error vulnerability. The vulnerability stems from the system’s failure to properly restrict the modification of configuration files by specific users. An attacker can exploit a series of operations in ADB debugging mode. The vulnerability caused the application lock to be bypassed
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0961", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mate 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.188\\(c00e74r3p8\\)" }, { "model": "mate 20", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.0.188(c00e74r3p8)" }, { "model": "mate \u003c10.0.0.188", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "20" }, { "model": "mate 20", "scope": "eq", "trust": 0.1, "vendor": "huawei", "version": null }, { "model": "mate 20", "scope": "eq", "trust": 0.1, "vendor": "huawei", "version": "9.1.0.131(c00e131r3p1)" }, { "model": "mate 20", "scope": "eq", "trust": 0.1, "vendor": "huawei", "version": "9.1.0.139(c00e133r3p1)" }, { "model": "mate 20", "scope": "eq", "trust": 0.1, "vendor": "huawei", "version": "10.0.0.175(c00e70r3p8)" }, { "model": "mate 20", "scope": "eq", "trust": 0.1, "vendor": "huawei", "version": "10.0.0.185(c00e74r3p8)" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.0.0.188\\(c00e74r3p8\\)", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-1807" } ] }, "cve": "CVE-2020-1807", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-004654", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-27122", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-1807", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 0.9, "impactScore": 2.5, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.5, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2020-004654", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-1807", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "JVNDB-2020-004654", "trust": 0.8, "value": "Low" }, { "author": "CNVD", "id": "CNVD-2020-27122", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202004-1954", "trust": 0.6, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-1807", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" }, { "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI Mate 20 smartphones with versions earlier than 10.0.0.188(C00E74R3P8) have an improper authorization vulnerability. The software does not properly restrict certain user\u0027s modification of certain configuration file, successful exploit could allow the attacker to bypass app lock after a series of operation in ADB mode. Huawei Mate 20 is a smart phone of the Chinese company Huawei. \n\r\n\r\nBefore Huawei Mate 20 10.0.0.188 (C00E74R3P8), there was an access control error vulnerability. The vulnerability stems from the system\u2019s failure to properly restrict the modification of configuration files by specific users. An attacker can exploit a series of operations in ADB debugging mode. The vulnerability caused the application lock to be bypassed", "sources": [ { "db": "NVD", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-1807", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2020-004654", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-27122", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202004-1954", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-1807", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" }, { "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "id": "VAR-202004-0961", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" } ], "trust": 1.26765326 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" } ] }, "last_update_date": "2023-12-18T13:43:00.059000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200422-01-smartphone", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-smartphone-en" }, { "title": "Patch for Huawei Mate 20 access control error vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/216753" }, { "title": "Huawei Mate 20 Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=116723" }, { "title": "Huawei Security Advisories: Security Advisory - Improper Authorization Vulnerability in Several Smartphones", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=daf6c3e6182f254486d0180254736189" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-863", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-1807" }, { "trust": 1.7, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200422-01-smartphone-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1807" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200422-01-smartphone-cn" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/180312" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" }, { "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-27122" }, { "db": "VULMON", "id": "CVE-2020-1807" }, { "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "db": "NVD", "id": "CVE-2020-1807" }, { "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "CNVD", "id": "CNVD-2020-27122" }, { "date": "2020-04-27T00:00:00", "db": "VULMON", "id": "CVE-2020-1807" }, { "date": "2020-05-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "date": "2020-04-27T15:15:13.080000", "db": "NVD", "id": "CVE-2020-1807" }, { "date": "2020-04-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "CNVD", "id": "CNVD-2020-27122" }, { "date": "2020-04-30T00:00:00", "db": "VULMON", "id": "CVE-2020-1807" }, { "date": "2020-05-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-004654" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-1807" }, { "date": "2020-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-1954" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI Mate 20 Unauthorized authentication vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-004654" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-1954" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.