Vulnerabilites related to huawei - columbia-tl00b
Vulnerability from fkie_nvd
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
{ "cisaActionDue": "2022-05-03", "cisaExploitAdd": "2021-11-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCEFDA14-C332-4604-85E5-332231B8853B", "versionEndExcluding": "10.0.0.177\\(c10e3r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "046C3C00-63A5-4CA9-9BFA-DEDF7D3A1D90", "versionEndExcluding": "10.0.0.178\\(c00e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F63CA2F-45B8-4DD3-81AE-8359929AE50B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3135BBC7-2A18-47E9-9041-16077B1102A2", "versionEndExcluding": "10.0.0.177\\(c10e4r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E8C828-0C05-4CD7-BC72-98AC05C6DDE5", "versionEndExcluding": "10.0.0.178\\(c01e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "142A8425-13E2-4215-80B6-80921BA7B3C1", "versionEndExcluding": "10.0.0.178\\(c01e178r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BE1BB06-0403-4F46-AF76-DAD85D538907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BD55A2A-8A54-4E48-B352-F7042BBF2C3F", "versionEndExcluding": "9.1.0.340\\(c00e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB5193B7-6F3F-4249-BB74-62480893CAB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8DF2BE8-65FB-43DF-9FCD-E79C7DF0BB16", "versionEndExcluding": "9.1.0.340\\(c01e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F60E9A-0ACB-4E44-ADFB-771C695FCF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E79C71B2-0344-4AFA-8AA5-560DE03AF9A4", "versionEndExcluding": "1.0.0.190\\(c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC591FA6-55E1-4628-AE43-CD1E2A4980E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15E9683F-8037-418C-90AB-7ABDB6BE13BD", "versionEndExcluding": "10.0.0.194\\(c636e3r3p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E2BCA7E-E555-45D1-807A-F53682B0C383", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD39CEB3-C282-4988-A642-58E41C8DDDED", "versionEndExcluding": "9.1.0.290\\(c185e5r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F27CB3A-F773-48FB-9CAE-20FC93273D21", "versionEndExcluding": "9.1.0.338\\(c00e333r1p1t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF68FFB0-01F8-4937-8BF4-36866F02E9A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE1E4E8B-0AD9-498D-81F3-13211D9E683E", "versionEndExcluding": "10.0.0.160\\(c01e32r2p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D1E240-F1DE-4FC0-84B7-873978A9A6B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2128BDE5-AE3B-427E-8A25-F3065850206A", "versionEndExcluding": "9.1.0.291\\(c185e3r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43BBA181-3DDA-4BE0-A21E-FCBE2FB39BAA", "versionEndExcluding": "10.0.0.198\\(c432e10r3p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B12799AD-C7F4-4F02-9BF6-93EB2BE69744", "versionEndExcluding": "9.1.0.251\\(c00e106r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "44E124FE-9F3E-4A89-9DFB-2ACEF751BA82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB6F70FE-53A7-439A-8423-9BA3CB6A9510", "versionEndExcluding": "9.1.0.146\\(c00e131r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "38E3A00A-6EB8-4E04-B1BC-E7663C9C1EA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58FFB71A-0A0A-458E-A035-A353BB4A8894", "versionEndExcluding": "9.1.0.160\\(c00e150r1p7\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBF2ED42-43B8-4586-913A-62607E458BDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FDE93D9-3B6C-4630-AFEF-77184BA570C5", "versionEndExcluding": "9.1.0.261\\(c00e120r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE8B2A97-DA47-40C8-8DB5-1AE1A89559A5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D85AB1CB-E1A8-49C2-A49E-DB0624ACE41B", "versionEndExcluding": "9.1.0.380\\(c636e1r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*", "matchCriteriaId": "143485B2-5216-4190-8306-63D12362F6AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AC6D9E1-DC06-4CB7-9E0D-8BABCB5F331F", "versionEndExcluding": "10.0.0.194\\(c00e61r4p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9F930E0-D32C-4D37-8A1D-78D4BFAECF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96856831-31DE-4853-B1B9-9B666BB861F1", "versionEndExcluding": "9.1.0.237\\(c00e80r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A35E71-4D6A-494D-882B-987CE16E3467", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC6C2354-5777-40FE-99A4-51AF4233B139", "versionEndExcluding": "9.1.0.237\\(c01e80r1p7t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "905B9A20-E643-4E82-B918-6067398A0E25", "versionEndExcluding": "10.0.0.159\\(c00e64r1p5\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63B310F0-9165-48E3-9609-6CA49D6E10C5", "versionEndExcluding": "10.1.0.137\\(c00e137r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E14B978-2A3C-4F55-8E3A-BA41AB137C33", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D4E2493-F5E5-4DB3-BD0F-87A8B07A3BBD", "versionEndExcluding": "10.0.0.196\\(c01e65r2p11\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0993FFB0-E860-437B-94AF-5D80D7598F5B", "versionEndExcluding": "10.0.0.196\\(c00e62r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*", "matchCriteriaId": "562D05D2-CC9E-4973-9E8D-B40C0ED6C721", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8C81625-2725-4B62-9DB5-7FC9B822A51A", "versionEndExcluding": "10.0.0.202\\(c10e3r3p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9F4FF5-07B8-456E-87C3-DB7C725E20F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BD65BBE-8AAA-4B67-A9B6-A58A4DD0CF74", "versionEndExcluding": "10.0.0.194\\(c00e62r8p12\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D81385-913B-4A38-A712-41CAE7B78DF4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECBCD3C2-25B7-431D-8277-E25616008891", "versionEndExcluding": "10.0.0.177\\(c432e3r1p4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", "matchCriteriaId": "07042814-6B3A-4D7C-A776-02DA9AC9B8DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59A1E3C0-5364-4C4D-BB27-69941AAE68C0", "versionEndExcluding": "10.0.0.202\\(c10e3r3p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E2BCA7E-E555-45D1-807A-F53682B0C383", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25442A0C-4E81-4417-BC5E-8F9CC71E4AED", "versionEndExcluding": "9.1.0.290\\(c431e1r1p8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19E562E7-C11D-4D00-B288-B287EC7BF250", "versionEndExcluding": "9.1.0.290\\(c605e6r1p6\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "671F4E52-9877-40BA-AA8A-377C9DD7431A", "versionEndExcluding": "9.1.0.295\\(c431e5r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E7053C3-4EB2-438E-9544-41ACF7A91057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2224974-8DCD-410A-A072-2D52B26BB56D", "versionEndExcluding": "9.1.0.291\\(c432e5r2p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A71A7A6-2220-45F0-B9E0-560632C36EE2", "versionEndExcluding": "9.1.0.291\\(c636e4r4p1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D1A153-274B-40A2-B9A8-F5E8B83258A1", "versionEndExcluding": "9.1.0.297\\(c605e4r4p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2E19C33-F393-4E0C-9AA7-461AF50EDF7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "511131DF-79C4-41A5-A0D3-015A832B2C35", "versionEndExcluding": "10.0.0.200\\(c185e3r3p3\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24DC8C7E-C586-4B6C-99A9-808202A7BD55", "versionEndExcluding": "10.0.0.201\\(c10e5r4p3\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A55CF4F-8E86-419C-845B-CE60070620A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" }, { "lang": "es", "value": "En los manejadores de ioctl del controlador Mediatek de Command Queue, hay una posible escritura fuera de l\u00edmites debido a un saneamiento de entrada insuficiente y a una falta de restricciones de SELinux. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: kernel de Android, ID de Android: A-147882143, Referencias: M-ALPS04356754" } ], "id": "CVE-2020-0069", "lastModified": "2025-02-07T13:15:28.787", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-03-10T20:15:21.947", "references": [ { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" }, { "source": "security@android.com", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://source.android.com/security/bulletin/2020-03-01" } ], "sourceIdentifier": "security@android.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:anne-al00_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A61FF27C-1D5A-414C-88BE-A4E1567D57E3", "versionEndExcluding": "9.1.0.331\\(c675e9r1p3t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:anne-al00:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F78E5C-78A2-464C-B4DC-8CF6A2D1133C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7BA6CC3-74ED-4936-B5F3-09AE0942D7F1", "versionEndExcluding": "10.0.1.1\\(c675r1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB51593F-70AE-47F6-AFE5-02693181E599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd16-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71E7A9EC-D51E-4E00-9E20-397405DD405E", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd16-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4BF946-F846-4B59-A8BD-71D3C32FA9DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1259623C-9765-4A03-B984-71BC23832EA5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "86840A12-552E-4673-9459-9C888D311227", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd17-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5021FFF9-39E9-4392-8F7B-77C99AD9021B", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd17-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "192D571A-3612-48FF-AD58-F85C05109DB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99350875-103C-4E3D-A3F1-CB51A3F04CAB", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3B85A0E-7A60-464B-BDA0-F62CBB91D469", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:cd18-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "541F6EEE-365C-4317-BE40-5D1780023B37", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:cd18-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "272588E3-15DA-48C5-B5EA-E53D981294B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78009F5F-1CC7-41D5-B3D7-DFDD6888CF98", "versionEndExcluding": "9.0.0.187\\(c01e181r1p20t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02334509-2493-419F-8FF5-E1F1076FB930", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:e6878-370_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A597E29-2CFE-4D6F-8141-D0A8A04C7BF9", "versionEndExcluding": "10.0.5.1\\(h610sp10c00\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:e6878-370:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA263F9-F9F5-4249-A55A-748689F0271E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01770930-E2A3-4759-8367-4DAA53046B20", "versionEndExcluding": "10.0.0.182\\(c675e17r2p2\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "033EDED3-AF7B-40D7-A467-E3AAAFB88AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lelandp-l22a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93DD848A-F0E2-4064-BB74-9FC5C82157AB", "versionEndExcluding": "9.1.0.166\\(c675e5r1p4t8\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lelandp-l22a:-:*:*:*:*:*:*:*", "matchCriteriaId": "842AB2B6-2C7A-4681-ACB7-E642E5D9D76D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:tc5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BE98F19-5883-4C1F-892E-4AEF2DB7EDB0", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:tc5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "392304B7-F9CD-44B4-88FB-353A650DB700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01371306-680F-4007-8E5A-865C67D657E5", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9FA3F67-7545-444D-BCCB-133B6680F3A7", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "C907A885-BA32-4819-B53C-0FBFE38C2510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91D3BD34-4095-4730-995D-5731A0BB8BF9", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E7101C-170D-4EA2-96A7-410AE55137BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5200-17_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23D525C1-B8A9-422B-A315-73BF6D4DEF7B", "versionEndExcluding": "10.0.2.23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5200-17:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EAA19C-B250-4809-BE4A-4575D5F793A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws5800-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "738EA159-65D7-42FE-B29F-1890F93A1A5D", "versionEndExcluding": "10.0.3.27", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws5800-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED553DD3-585A-4BD2-9291-B9C09AC6AC40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-10_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDF3E0C-594B-48BF-8E9F-4A10A11D5449", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-10:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C660061-69B0-43B8-BFD3-E858C6B2B437", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:ws6500-16_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0571923-C1D0-4F06-AD1E-9D43F5290B74", "versionEndExcluding": "10.0.2.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:ws6500-16:-:*:*:*:*:*:*:*", "matchCriteriaId": "B611DA7B-A2E3-44A3-BC8B-C43308EF3E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" }, { "lang": "es", "value": "Hay una vulnerabilidad de filtrado de informaci\u00f3n en algunos productos Huawei. Un atacante adyacente no autenticado podr\u00eda explotar esta vulnerabilidad para descifrar datos. Las versiones de producto afectadas incluyen: Anne-AL00 Versiones anteriores a la versi\u00f3n 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versiones anteriores a la versi\u00f3n 10.0.1.1(C675R1); CD16-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD17-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; CD18-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.2.8; Columbia-TL00B Versiones anteriores a la versi\u00f3n 9.0.0.187(C01E181R1P20T8); E6878-370 Versiones anteriores a la versi\u00f3n 10.0.han 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versiones anteriores a la versi\u00f3n 10.0.0.185(C605E3R1P3), Versiones anteriores a la versi\u00f3n 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versiones anteriores a la versi\u00f3n 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00AY Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-AL00BX Versiones anteriores a la versi\u00f3n 10.0.0.158(C00E64R1P9); Marie-L03BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); Marie-L21BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C432E4R4P1), V 10.0.0.188(C461E5R3P1); Marie-L22BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C636E3R3P1); Marie-L23BX Versiones anteriores a la versi\u00f3n 10.0.0.188(C605E5R1P1); TC5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-11 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-12 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5200-16 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS5200-17 Versiones anteriores a la versi\u00f3n 10.0.2.23; WS5800-10 Versiones anteriores a la versi\u00f3n 10.0.3.27; WS6500-10 Versiones anteriores a la versi\u00f3n 10.0.2.8; WS6500-16 Versiones anteriores a la versi\u00f3n 10.0.2.8" } ], "id": "CVE-2020-9069", "lastModified": "2024-11-21T05:39:57.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-21T15:15:10.123", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202005-0971
Vulnerability from variot
There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China's Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "marie-l21bx \u003c=10.0.0.188", "scope": null, "trust": 1.2, "vendor": "huawei", "version": null }, { "model": "honor 10 lite", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.182\\(c675e17r2p2\\)" }, { "model": "ws5800-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.3.27" }, { "model": "columbia-tl00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.0.0.187\\(c01e181r1p20t8\\)" }, { "model": "ws5200-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws6500-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd16-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "tc5200-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "e6878-370", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.5.1\\(h610sp10c00\\)" }, { "model": "anne-al00", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.331\\(c675e9r1p3t8\\)" }, { "model": "cd18-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "ws5200-17", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.23" }, { "model": "ws5200-11", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.23" }, { "model": "cd17-16", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "berkeley-l09", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.1.1\\(c675r1\\)" }, { "model": "ws5200-11", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "lelandp-l22a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.166\\(c675e5r1p4t8\\)" }, { "model": "ws6500-10", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "anne-al00", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.1.0.331(c675e9r1p3t8)" }, { "model": "berkeley-l09", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.1.1(c675r1)" }, { "model": "cd16-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd17-16", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-10", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "cd18-16", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.2.8" }, { "model": "columbia-tl00b", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.0.0.187(c01e181r1p20t8)" }, { "model": "e6878-370", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "10.0.5.1(h610sp10c00)" }, { "model": "honor 10 lite", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": "9.0.1.113(c675e11r1p12)" }, { "model": "anne-al00 \u003c=9.1.0.331", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "berkeley-l09 \u003c=10.0.1.1", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "cd16-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd17-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd17-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd18-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "cd18-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "columbia-tl00b \u003c=9.0.0.187", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "e6878-370 \u003c=10.0.5.1", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p30 lite \u003c=10.0.0.185", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "p30 lite \u003c=10.0.0.197", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "nova 4e \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "honor lite 9.0.1.113", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "10" }, { "model": "lelandp-l22a \u003c=9.1.0.166", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-al00ax \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-al00bx \u003c=10.0.0.158", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-l22bx \u003c=10.0.0.188", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "marie-l23bx \u003c=10.0.0.188", "scope": null, "trust": 0.6, "vendor": "huawei", "version": null }, { "model": "tc5200-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-11", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-12", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.23" }, { "model": "ws5200-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws5200-17", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.23" }, { "model": "ws5800-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.3.27" }, { "model": "ws6500-10", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" }, { "model": "ws6500-16", "scope": "lte", "trust": 0.6, "vendor": "huawei", "version": "\u003c=10.0.2.8" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:huawei:anne-al00_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:berkeley-l09_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cd16-10_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cd17-10_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cd17-16_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cd18-10_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:cd18-16_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:columbia-tl00b_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:e6878-370_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:huawei:honor_10_lite_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005593" } ] }, "cve": "CVE-2020-9069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2020-9069", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005593", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CNVD-2020-36726", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-9069", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005593", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-9069", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-005593", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2020-36726", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202005-1099", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8. Huawei Anne-AL00 and other products are products of China\u0027s Huawei company. Huawei Anne-AL00 is a smartphone. Honor 10 Lite is a smartphone. Huawei TC5200-16 is a wireless router", "sources": [ { "db": "NVD", "id": "CVE-2020-9069" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNVD", "id": "CNVD-2020-36726" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9069", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2020-005593", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-36726", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202005-1099", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "id": "VAR-202005-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" } ], "trust": 1.3586212199999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" } ] }, "last_update_date": "2024-11-23T21:51:28.931000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "huawei-sa-20200520-01-leakage", "trust": 0.8, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "title": "Patch for Multiple Huawei product information disclosure vulnerabilities (CNVD-2020-36726)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/224779" }, { "title": "Multiple Huawei Product information disclosure vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119391" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9069" }, { "trust": 1.6, "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9069" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200520-01-leakage-cn" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-36726" }, { "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "db": "NVD", "id": "CVE-2020-9069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2020-36726" }, { "date": "2020-06-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "date": "2020-05-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "date": "2020-05-21T15:15:10.123000", "db": "NVD", "id": "CVE-2020-9069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-07-07T00:00:00", "db": "CNVD", "id": "CNVD-2020-36726" }, { "date": "2020-06-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005593" }, { "date": "2020-07-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202005-1099" }, { "date": "2024-11-21T05:39:57.940000", "db": "NVD", "id": "CVE-2020-9069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Huawei Information leakage vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202005-1099" } ], "trust": 0.6 } }
var-202003-0573
Vulnerability from variot
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754. Android An out-of-bounds write vulnerability exists in the kernel. This vulnerability is Android ID: A-147882143 and References: M-ALPS04356754 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0573", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "columbia-l29d", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.177\\(c10e4r1p4\\)" }, { "model": "honor 8a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.291\\(c185e3r4p1\\)" }, { "model": "y6 2019", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.290\\(c431e1r1p8\\)" }, { "model": "paris-l29b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.380\\(c636e1r1p3t8\\)" }, { "model": "sydneym-al00", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.159\\(c00e64r1p5\\)" }, { "model": "y6 2019", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.295\\(c431e5r2p2\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.198\\(c432e10r3p4\\)" }, { "model": "honor 8a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.291\\(c636e4r4p1\\)" }, { "model": "tony-al00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.1.0.137\\(c00e137r2p11\\)" }, { "model": "yale-l21a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.202\\(c10e3r3p2\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.194\\(c636e3r3p1\\)" }, { "model": "katyusha-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.146\\(c00e131r2p2\\)" }, { "model": "columbia-l29d", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.177\\(c432e3r1p4\\)" }, { "model": "honor 20 pro", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.202\\(c10e3r3p2\\)" }, { "model": "nova 3", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.338\\(c00e333r1p1t8\\)" }, { "model": "sydney-al00", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.237\\(c00e80r1p7t8\\)" }, { "model": "madrid-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.261\\(c00e120r4p1\\)" }, { "model": "jakarta-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.251\\(c00e106r2p2\\)" }, { "model": "cornell-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.340\\(c00e333r1p1t8\\)" }, { "model": "berkeley-l09", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.177\\(c10e3r1p4\\)" }, { "model": "tony-tl00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.196\\(c01e65r2p11\\)" }, { "model": "y6 2019", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.290\\(c605e6r1p6\\)" }, { "model": "princeton-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.194\\(c00e61r4p11\\)" }, { "model": "sydney-tl00", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.237\\(c01e80r1p7t8\\)" }, { "model": "columbia-tl00b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.178\\(c01e178r1p4\\)" }, { "model": "yalep-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.194\\(c00e62r8p12\\)" }, { "model": "honor 8a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.291\\(c432e5r2p1\\)" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": null }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.200\\(c185e3r3p3\\)" }, { "model": "dura-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "1.0.0.190\\(c00\\)" }, { "model": "columbia-tl00d", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.178\\(c01e178r1p4\\)" }, { "model": "columbia-al10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.178\\(c00e178r1p4\\)" }, { "model": "yale-al00a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.196\\(c00e62r8p12\\)" }, { "model": "cornell-tl10b", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.340\\(c01e333r1p1t8\\)" }, { "model": "y6 2019", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.290\\(c185e5r4p1\\)" }, { "model": "honor view 20", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.201\\(c10e5r4p3\\)" }, { "model": "honor 8a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.297\\(c605e4r4p2\\)" }, { "model": "katyusha-al10a", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "9.1.0.160\\(c00e150r1p7\\)" }, { "model": "nova 4", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "10.0.0.160\\(c01e32r2p4\\)" }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:google:android", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002589" } ] }, "cve": "CVE-2020-0069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-0069", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-002589", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-0069", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-002589", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-0069", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-002589", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202003-058", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-0069", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "CNNVD", "id": "CNNVD-202003-058" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754. Android An out-of-bounds write vulnerability exists in the kernel. This vulnerability is Android ID: A-147882143 and References: M-ALPS04356754 It is published as.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "VULMON", "id": "CVE-2020-0069" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0069", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-002589", "trust": 0.8 }, { "db": "NSFOCUS", "id": "49181", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202003-058", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-0069", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "CNNVD", "id": "CNNVD-202003-058" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "id": "VAR-202003-0573", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.40679499571428573 }, "last_update_date": "2024-11-23T23:01:30.706000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Android \u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u516c\u958b\u60c5\u5831 - 2020 \u5e74 3 \u6708", "trust": 0.8, "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "title": "Android Mediatek Command Queue driver Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111723" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/03/05/google_march_android_fixes/" }, { "title": "Huawei Security Advisories: Security Advisory - Privilege Escalation Vulnerability in Some Huawei Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=e8eb2ffe13149bb69d2b928842ea24a6" }, { "title": "CVE-2020-0069_poc", "trust": 0.1, "url": "https://github.com/quarkslab/CVE-2020-0069_poc " }, { "title": "AutomatedRoot", "trust": 0.1, "url": "https://github.com/R0rt1z2/AutomatedRoot " }, { "title": "CVE-POC", "trust": 0.1, "url": "https://github.com/0xT11/CVE-POC " }, { "title": "PoC", "trust": 0.1, "url": "https://github.com/Jonathan-Elias/PoC " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/developer3000S/PoC-in-GitHub " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/nomi-sec/PoC-in-GitHub " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/hectorgie/PoC-in-GitHub " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/mediatek-bug-actively-exploited-android/153408/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "CNNVD", "id": "CNNVD-202003-058" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" }, { "trust": 1.7, "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0069" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0069" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200527-01-mtk-cn" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/49181" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/google-android-pixel-multiple-vulnerabilities-of-march-2020-31720" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://github.com/quarkslab/cve-2020-0069_poc" }, { "trust": 0.1, "url": "https://github.com/r0rt1z2/automatedroot" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "CNNVD", "id": "CNNVD-202003-058" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-0069" }, { "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "db": "CNNVD", "id": "CNNVD-202003-058" }, { "db": "NVD", "id": "CVE-2020-0069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-10T00:00:00", "db": "VULMON", "id": "CVE-2020-0069" }, { "date": "2020-03-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "date": "2020-03-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-058" }, { "date": "2020-03-10T20:15:21.947000", "db": "NVD", "id": "CVE-2020-0069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-27T00:00:00", "db": "VULMON", "id": "CVE-2020-0069" }, { "date": "2020-03-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002589" }, { "date": "2020-09-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-058" }, { "date": "2024-11-21T04:52:50.800000", "db": "NVD", "id": "CVE-2020-0069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-058" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Android Out-of-bounds write vulnerability in kernel", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-058" } ], "trust": 0.6 } }
cve-2020-0069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://source.android.com/security/bulletin/2020-03-01 | x_refsource_MISC | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:47:40.759Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2020-0069", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T13:03:30.656110Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2021-11-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-0069" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-07T13:03:36.836Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Android", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Android kernel" } ] } ], "descriptions": [ { "lang": "en", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-27T11:06:04.000Z", "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@android.com", "ID": "CVE-2020-0069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Android", "version": { "version_data": [ { "version_value": "Android kernel" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://source.android.com/security/bulletin/2020-03-01", "refsource": "MISC", "url": "https://source.android.com/security/bulletin/2020-03-01" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "assignerShortName": "google_android", "cveId": "CVE-2020-0069", "datePublished": "2020-03-10T19:56:37.000Z", "dateReserved": "2019-10-17T00:00:00.000Z", "dateUpdated": "2025-02-07T13:03:36.836Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-9069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | HUAWEI | Anne-AL00 |
Version: earlier than 9.1.0.331(C675E9R1P3T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:19:19.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Anne-AL00", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] }, { "product": "Berkeley-L09", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.1.1(C675R1)" } ] }, { "product": "CD16-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD17-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "CD18-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "Columbia-TL00B", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] }, { "product": "E6878-370", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.5.1(H610SP10C00)" } ] }, { "product": "HUAWEI P30 lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.185(C605E3R1P3)" }, { "status": "affected", "version": "earlier than 10.0.0.197(C432E8R2P7)" } ] }, { "product": "HUAWEI nova 4e", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Honor 10 Lite", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "9.0.1.113(C675E11R1P12)" } ] }, { "product": "LelandP-L22A", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] }, { "product": "Marie-AL00AX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00AY", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-AL00BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.158(C00E64R1P9)" } ] }, { "product": "Marie-L03BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "Marie-L21BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C432E4R4P1)" }, { "status": "affected", "version": "earlier than 10.0.0.188(C461E5R3P1)" } ] }, { "product": "Marie-L22BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C636E3R3P1)" } ] }, { "product": "Marie-L23BX", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.0.188(C605E5R1P1)" } ] }, { "product": "TC5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-11", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-12", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5200-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS5200-17", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.23" } ] }, { "product": "WS5800-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.3.27" } ] }, { "product": "WS6500-10", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] }, { "product": "WS6500-16", "vendor": "HUAWEI", "versions": [ { "status": "affected", "version": "earlier than 10.0.2.8" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ], "problemTypes": [ { "descriptions": [ { "description": "Information Leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-29T22:23:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-9069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Anne-AL00", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.331(C675E9R1P3T8)" } ] } }, { "product_name": "Berkeley-L09", "version": { "version_data": [ { "version_value": "earlier than 10.0.1.1(C675R1)" } ] } }, { "product_name": "CD16-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD17-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "CD18-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "Columbia-TL00B", "version": { "version_data": [ { "version_value": "earlier than 9.0.0.187(C01E181R1P20T8)" } ] } }, { "product_name": "E6878-370", "version": { "version_data": [ { "version_value": "earlier than 10.0.5.1(H610SP10C00)" } ] } }, { "product_name": "HUAWEI P30 lite", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.185(C605E3R1P3)" }, { "version_value": "earlier than 10.0.0.197(C432E8R2P7)" } ] } }, { "product_name": "HUAWEI nova 4e", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Honor 10 Lite", "version": { "version_data": [ { "version_value": "9.0.1.113(C675E11R1P12)" } ] } }, { "product_name": "LelandP-L22A", "version": { "version_data": [ { "version_value": "earlier than 9.1.0.166(C675E5R1P4T8)" } ] } }, { "product_name": "Marie-AL00AX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00AY", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-AL00BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.158(C00E64R1P9)" } ] } }, { "product_name": "Marie-L03BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "Marie-L21BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C432E4R4P1)" }, { "version_value": "earlier than 10.0.0.188(C461E5R3P1)" } ] } }, { "product_name": "Marie-L22BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C636E3R3P1)" } ] } }, { "product_name": "Marie-L23BX", "version": { "version_data": [ { "version_value": "earlier than 10.0.0.188(C605E5R1P1)" } ] } }, { "product_name": "TC5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-11", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-12", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5200-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS5200-17", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.23" } ] } }, { "product_name": "WS5800-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.3.27" } ] } }, { "product_name": "WS6500-10", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } }, { "product_name": "WS6500-16", "version": { "version_data": [ { "version_value": "earlier than 10.0.2.8" } ] } } ] }, "vendor_name": "HUAWEI" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: Anne-AL00 Versions earlier than 9.1.0.331(C675E9R1P3T8); Berkeley-L09 Versions earlier than 10.0.1.1(C675R1); CD16-10 Versions earlier than 10.0.2.8; CD17-10 Versions earlier than 10.0.2.8; CD17-16 Versions earlier than 10.0.2.8; CD18-10 Versions earlier than 10.0.2.8; CD18-16 Versions earlier than 10.0.2.8; Columbia-TL00B Versions earlier than 9.0.0.187(C01E181R1P20T8); E6878-370 Versions earlier than 10.0.5.1(H610SP10C00); HUAWEI P30 lite Versions earlier than 10.0.0.185(C605E3R1P3), Versions earlier than 10.0.0.197(C432E8R2P7); HUAWEI nova 4e Versions earlier than 10.0.0.158(C00E64R1P9); Honor 10 Lite 9.0.1.113(C675E11R1P12); LelandP-L22A Versions earlier than 9.1.0.166(C675E5R1P4T8); Marie-AL00AX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00AY Versions earlier than 10.0.0.158(C00E64R1P9); Marie-AL00BX Versions earlier than 10.0.0.158(C00E64R1P9); Marie-L03BX Versions earlier than 10.0.0.188(C605E5R1P1); Marie-L21BX Versions earlier than 10.0.0.188(C432E4R4P1), Versions earlier than 10.0.0.188(C461E5R3P1); Marie-L22BX Versions earlier than 10.0.0.188(C636E3R3P1); Marie-L23BX Versions earlier than 10.0.0.188(C605E5R1P1); TC5200-16 Versions earlier than 10.0.2.8; WS5200-11 Versions earlier than 10.0.2.8; WS5200-12 Versions earlier than 10.0.2.23; WS5200-16 Versions earlier than 10.0.2.8; WS5200-17 Versions earlier than 10.0.2.23; WS5800-10 Versions earlier than 10.0.3.27; WS6500-10 Versions earlier than 10.0.2.8; WS6500-16 Versions earlier than 10.0.2.8" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en", "refsource": "CONFIRM", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200520-01-leakage-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-9069", "datePublished": "2020-05-21T14:19:31", "dateReserved": "2020-02-18T00:00:00", "dateUpdated": "2024-08-04T10:19:19.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }