Vulnerabilites related to huawei - honor_7_firmware
Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:24
Severity ?
Summary
The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en | Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/96424 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/96424 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | honor_7_firmware | * | |
huawei | honor_7 | - | |
huawei | mate_s_firmware | * | |
huawei | mate_s | - | |
huawei | lyo-l21_firmware | * | |
huawei | lyo-l21 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07635BE0-7F45-4CA5-8EE3-F899B98536F4", "versionEndExcluding": "plk-ul00c17b385", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1B7AB43-145E-4708-B75B-87005B275803", "versionEndExcluding": "crr-l09c432b380", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:lyo-l21_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59329DF4-B8B7-4E53-89E6-1C9CB2B5E998", "versionEndExcluding": "lyo-l21c577b128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:lyo-l21:-:*:*:*:*:*:*:*", "matchCriteriaId": "0231E0AD-6E51-4D02-94FF-59D0F28AB9F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code." }, { "lang": "es", "value": "Huawei Themes APP en versiones anteriores a la PLK-UL00C17B385; versiones anteriores a la CRR-L09C432B380 y versiones anteriores a la LYO-L21C577B128 tiene una vulnerabilidad de elevaci\u00f3n de privilegios. Un atacante podr\u00eda explotar esta vulnerabilidad para subir paquetes de temas que contengan archivos maliciosos y enga\u00f1ar a los usuarios para que instalen los paquetes de temas. Esto conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2017-2699", "lastModified": "2024-11-21T03:24:00.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-22T19:29:00.567", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96424" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-04-02 20:59
Modified
2024-11-21 03:00
Severity ?
Summary
Huawei Honor 6, Honor 6 Plus, Honor 7 phones with software versions earlier than 6.9.16 could allow attackers to disable the PXN defense mechanism by invoking related drive code to crash the system or escalate privilege.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en | Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/93885 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93885 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
huawei | honor_6_firmware | - | |
huawei | honor_6 | - | |
huawei | honor_6_plus_firmware | - | |
huawei | honor_6_plus | - | |
huawei | honor_7_firmware | - | |
huawei | honor_7 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C116913A-693F-40E3-A60E-329F9EF21774", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F29AE585-268C-4AAB-A1B5-E7D6105DDE2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "114E7780-973B-4A31-B5C3-1FDF54925E18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "933D44DF-9698-4AEC-85CB-F29F82F1064C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Huawei Honor 6, Honor 6 Plus, Honor 7 phones with software versions earlier than 6.9.16 could allow attackers to disable the PXN defense mechanism by invoking related drive code to crash the system or escalate privilege." }, { "lang": "es", "value": "Los tel\u00e9fonos Huawei Honor 6, Honor 6 Plus, Honor 7 con versiones de software anteriores a 6.9.16 podr\u00edan permitir a atacantes deshabilitar el mecanismo de defensa PXN invocando el c\u00f3digo de unidad relacionada para bloquear el sistema o escalar privilegio." } ], "id": "CVE-2016-8768", "lastModified": "2024-11-21T03:00:01.270", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-02T20:59:01.360", "references": [ { "source": "psirt@huawei.com", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93885" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93885" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-254" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:23
Severity ?
Summary
ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | Issue Tracking, Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/95919 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95919 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7724AF7A-50BA-4CE0-9A9A-D27566F58B25", "versionEndIncluding": "ale-l02c635b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83EB021A-25B6-4AC2-9889-1909024FDAEA", "versionEndIncluding": "ale-l02c636b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "424CDED4-35A8-4C0C-8FF4-DB7BF75DDEFA", "versionEndIncluding": "ale-l21c10b150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5199B31-EA26-4372-81B2-887A420D2E36", "versionEndIncluding": "ale-l21c185b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05436D77-3853-4F10-8E1C-7218512145A1", "versionEndIncluding": "ale-l21c432b214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83678841-1D5A-4705-BC1E-D7F3154B8750", "versionEndIncluding": "ale-l21c464b150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A1A2384-3E3A-47B0-8CAE-ABEE549E5AAF", "versionEndIncluding": "ale-l21c636b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CFEE6AE-7603-4F03-AA2F-346B705115AE", "versionEndIncluding": "ale-l23c605b190", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1207235-5EF1-4819-9A86-10E224A58E81", "versionEndIncluding": "ale-tl00c01b250", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6245F2E-0B7E-467D-891F-D9C7B71F2CE5", "versionEndIncluding": "ale-ul00c00b250.", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DA0EC91-816E-40EF-A00E-567487007EB5", "versionEndIncluding": "mt7-l09c605b325", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B546D881-033E-401E-ABCE-B452E061ADEB", "versionEndIncluding": "mt7-l09c900b339", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F7F2091-2CC8-4D24-85F6-0EEA3008568D", "versionEndIncluding": "mt7-tl10c900b339", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54076A31-2149-4AE0-88B5-FF863E374FB3", "versionEndIncluding": "crr-cl00c92b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1046A30D-EE1B-40B3-85E2-388B11C9F7FC", "versionEndIncluding": "crr-l09c432b180", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0386E551-C55D-47ED-AC2B-AB2489B0A000", "versionEndIncluding": "crr-tl00c01b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9A7DF2F-0A33-43BC-A426-0CF667905F91", "versionEndIncluding": "crr-ul00c00b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC1AC9D1-179E-480F-93CF-7F24E3A74CB1", "versionEndIncluding": "crr-ul20c432b171", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A1E69-7C2B-421F-8805-4E456576E1F7", "versionEndIncluding": "gra-cl00c92b230", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B044F2-678D-4FCE-A16A-0A04F0106F0B", "versionEndIncluding": "gra-l09c432b222", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFE18F-4C50-4D01-8FA3-C9A24A0107CA", "versionEndIncluding": "gra-tl00c01b230sp01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31D6B0CD-AFAC-45B9-B354-C056DC191D9F", "versionEndIncluding": "gra-ul00c00b230", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C533D39-CB45-44A8-94BC-9FB3538EA248", "versionEndIncluding": "gra-ul00c10b201", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90DAA207-3B9B-4777-9713-FBF1F98A4550", "versionEndIncluding": "gra-ul00c432b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A916265A-0B07-4D16-87E4-EE91B0C7AA17", "versionEndIncluding": "h60-l04c10b523", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8EEC73F-65D0-4718-BFEB-63FB67587876", "versionEndIncluding": "h60-l04c185b523", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EF243FA-FD01-4C9F-B678-7A9C0B6DA8A1", "versionEndIncluding": "h60-l04c636b527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7466C98-A8A9-4576-8F2F-C2E261CFC49A", "versionEndIncluding": "h60-l04c900b530", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1315DA87-F09A-424D-8CB1-539E37051448", "versionEndIncluding": "plk-al10c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C3C2F-B6FB-40E7-BB95-90BB2285CFDE", "versionEndIncluding": "plk-al10c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1E6DE-CDDF-4150-9FED-CE4E493ACA22", "versionEndIncluding": "plk-cl00c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26", "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26", "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EF4498F-D552-4CDD-AF89-69B743E7586A", "versionEndIncluding": "plk-l01c432b187", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DF2083D-2C5A-48C9-8FE5-754D76E67E62", "versionEndIncluding": "plk-l01c432b190", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50C66FB1-5300-4641-9E43-ED4348CCDDFB", "versionEndIncluding": "plk-l01c636b130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29417-0F7D-44AC-9190-9A33C44B9116", "versionEndIncluding": "plk-tl00c01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1370B7E9-6661-47BF-9774-D039B4600E9F", "versionEndIncluding": "plk-tl01hc01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "409EE9E2-DB91-408D-AC1C-FBD2FD012D74", "versionEndIncluding": "plk-ul00c17b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B4A1A-9085-499E-BC8D-8F6CB397DDC8", "versionEndIncluding": "ath-al00c92b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F65A7370-8647-4579-967C-973C71A5BF2A", "versionEndIncluding": "ath-cl00c92b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8A24BA-DA72-4600-8379-325D5C301A14", "versionEndIncluding": "ath-tl00c01b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F981C7C9-0BDE-4BFB-B7C1-817232AB90B1", "versionEndIncluding": "ath-tl00hc01b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1DC7ACF-D9F9-4838-B2D2-B76BE6A371CB", "versionEndIncluding": "ath-ul00c00b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE9B2A2-D817-45E8-8275-074F9D7B4FE6", "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D73F80-CE84-4EE9-B265-F98964260847", "versionEndIncluding": "ath-al00c00b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3527A237-6376-4627-A751-2FB1DA21056B", "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE61DCD9-C662-4DB6-B730-E92525F0B910", "versionEndIncluding": "rio-cl00c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651C17D-C3B2-45D3-B683-5F097A8A2E76", "versionEndIncluding": "rio-tl00c01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "184349A3-3974-4273-9A92-30019FAFFAC2", "versionEndIncluding": "rio-ul00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path." }, { "lang": "es", "value": "Versiones ALE-L02C635B140 y anteriores; ALE-L02C636B140 y anteriores; ALE-L21C10B150 y anteriores; ALE-L21C185B200 y anteriores; ALE-L21C432B214 y anteriores; ALE-L21C464B150 y anteriores; ALE-L21C636B200 y anteriores; ALE-L23C605B190 y anteriores; ALE-TL00C01B250 y anteriores; ALE-UL00C00B250 y anteriores; MT7-L09C605B325 y anteriores; MT7-L09C900B339 y anteriores; MT7-TL10C900B339 y anteriores; CRR-CL00C92B172 y anteriores; CRR-L09C432B180 y anteriores; CRR-TL00C01B172 y anteriores; CRR-UL00C00B172 y anteriores; CRR-UL20C432B171 y anteriores; GRA-CL00C92B230 y anteriores; GRA-L09C432B222 y anteriores; GRA-TL00C01B230SP01 y anteriores; GRA-UL00C00B230 y anteriores; GRA-UL00C10B201 y anteriores; GRA-UL00C432B220 y anteriores; H60-L04C10B523 y anteriores; H60-L04C185B523 y anteriores; H60-L04C636B527 y anteriores; H60-L04C900B530 y anteriores; PLK-AL10C00B220 y anteriores; PLK-AL10C92B220 y anteriores; PLK-CL00C92B220 y anteriores; PLK-L01C10B140 y anteriores; PLK-L01C185B130 y anteriores; PLK-L01C432B187 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C636B130 y anteriores; PLK-TL00C01B220 y anteriores; PLK-TL01HC01B220 y anteriores; PLK-UL00C17B220 y anteriores; ATH-AL00C00B210 y anteriores; ATH-AL00C92B200 y anteriores; ATH-CL00C92B210 y anteriores; ATH-TL00C01B210 y anteriores; ATH-TL00HC01B210 y anteriores; ATH-UL00C00B210 y anteriores; RIO-AL00C00B220 y anteriores; RIO-CL00C92B220 y anteriores; RIO-TL00C01B220 y anteriores y versiones RIO-UL00C00B220 tiene una vulnerabilidad de salto de ruta. Un atacante podr\u00eda explotarlo para descomprimir archivos maliciosos en una ruta de destino." } ], "id": "CVE-2017-2693", "lastModified": "2024-11-21T03:23:59.603", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-22T19:29:00.367", "references": [ { "source": "psirt@huawei.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95919" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:23
Severity ?
Summary
The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@huawei.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | Issue Tracking, Vendor Advisory | |
psirt@huawei.com | http://www.securityfocus.com/bid/95919 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | Issue Tracking, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95919 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7724AF7A-50BA-4CE0-9A9A-D27566F58B25", "versionEndIncluding": "ale-l02c635b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83EB021A-25B6-4AC2-9889-1909024FDAEA", "versionEndIncluding": "ale-l02c636b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "424CDED4-35A8-4C0C-8FF4-DB7BF75DDEFA", "versionEndIncluding": "ale-l21c10b150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5199B31-EA26-4372-81B2-887A420D2E36", "versionEndIncluding": "ale-l21c185b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05436D77-3853-4F10-8E1C-7218512145A1", "versionEndIncluding": "ale-l21c432b214", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83678841-1D5A-4705-BC1E-D7F3154B8750", "versionEndIncluding": "ale-l21c464b150", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A1A2384-3E3A-47B0-8CAE-ABEE549E5AAF", "versionEndIncluding": "ale-l21c636b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CFEE6AE-7603-4F03-AA2F-346B705115AE", "versionEndIncluding": "ale-l23c605b190", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1207235-5EF1-4819-9A86-10E224A58E81", "versionEndIncluding": "ale-tl00c01b250", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6245F2E-0B7E-467D-891F-D9C7B71F2CE5", "versionEndIncluding": "ale-ul00c00b250.", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DA0EC91-816E-40EF-A00E-567487007EB5", "versionEndIncluding": "mt7-l09c605b325", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B546D881-033E-401E-ABCE-B452E061ADEB", "versionEndIncluding": "mt7-l09c900b339", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F7F2091-2CC8-4D24-85F6-0EEA3008568D", "versionEndIncluding": "mt7-tl10c900b339", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54076A31-2149-4AE0-88B5-FF863E374FB3", "versionEndIncluding": "crr-cl00c92b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1046A30D-EE1B-40B3-85E2-388B11C9F7FC", "versionEndIncluding": "crr-l09c432b180", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0386E551-C55D-47ED-AC2B-AB2489B0A000", "versionEndIncluding": "crr-tl00c01b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F9A7DF2F-0A33-43BC-A426-0CF667905F91", "versionEndIncluding": "crr-ul00c00b172", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC1AC9D1-179E-480F-93CF-7F24E3A74CB1", "versionEndIncluding": "crr-ul20c432b171", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E2A1E69-7C2B-421F-8805-4E456576E1F7", "versionEndIncluding": "gra-cl00c92b230", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59B044F2-678D-4FCE-A16A-0A04F0106F0B", "versionEndIncluding": "gra-l09c432b222", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFBFE18F-4C50-4D01-8FA3-C9A24A0107CA", "versionEndIncluding": "gra-tl00c01b230sp01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31D6B0CD-AFAC-45B9-B354-C056DC191D9F", "versionEndIncluding": "gra-ul00c00b230", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C533D39-CB45-44A8-94BC-9FB3538EA248", "versionEndIncluding": "gra-ul00c10b201", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90DAA207-3B9B-4777-9713-FBF1F98A4550", "versionEndIncluding": "gra-ul00c432b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A916265A-0B07-4D16-87E4-EE91B0C7AA17", "versionEndIncluding": "h60-l04c10b523", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8EEC73F-65D0-4718-BFEB-63FB67587876", "versionEndIncluding": "h60-l04c185b523", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EF243FA-FD01-4C9F-B678-7A9C0B6DA8A1", "versionEndIncluding": "h60-l04c636b527", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7466C98-A8A9-4576-8F2F-C2E261CFC49A", "versionEndIncluding": "h60-l04c900b530", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1315DA87-F09A-424D-8CB1-539E37051448", "versionEndIncluding": "plk-al10c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A6C3C2F-B6FB-40E7-BB95-90BB2285CFDE", "versionEndIncluding": "plk-al10c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6E1E6DE-CDDF-4150-9FED-CE4E493ACA22", "versionEndIncluding": "plk-cl00c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26", "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26", "versionEndIncluding": "plk-l01c10b140", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EF4498F-D552-4CDD-AF89-69B743E7586A", "versionEndIncluding": "plk-l01c432b187", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DF2083D-2C5A-48C9-8FE5-754D76E67E62", "versionEndIncluding": "plk-l01c432b190", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50C66FB1-5300-4641-9E43-ED4348CCDDFB", "versionEndIncluding": "plk-l01c636b130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFF29417-0F7D-44AC-9190-9A33C44B9116", "versionEndIncluding": "plk-tl00c01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1370B7E9-6661-47BF-9774-D039B4600E9F", "versionEndIncluding": "plk-tl01hc01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "409EE9E2-DB91-408D-AC1C-FBD2FD012D74", "versionEndIncluding": "plk-ul00c17b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*", "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF7B4A1A-9085-499E-BC8D-8F6CB397DDC8", "versionEndIncluding": "ath-al00c92b200", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F65A7370-8647-4579-967C-973C71A5BF2A", "versionEndIncluding": "ath-cl00c92b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8A24BA-DA72-4600-8379-325D5C301A14", "versionEndIncluding": "ath-tl00c01b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F981C7C9-0BDE-4BFB-B7C1-817232AB90B1", "versionEndIncluding": "ath-tl00hc01b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1DC7ACF-D9F9-4838-B2D2-B76BE6A371CB", "versionEndIncluding": "ath-ul00c00b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE9B2A2-D817-45E8-8275-074F9D7B4FE6", "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8D73F80-CE84-4EE9-B265-F98964260847", "versionEndIncluding": "ath-al00c00b210", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3527A237-6376-4627-A751-2FB1DA21056B", "versionEndIncluding": "rio-al00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE61DCD9-C662-4DB6-B730-E92525F0B910", "versionEndIncluding": "rio-cl00c92b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1651C17D-C3B2-45D3-B683-5F097A8A2E76", "versionEndIncluding": "rio-tl00c01b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "184349A3-3974-4273-9A92-30019FAFFAC2", "versionEndIncluding": "rio-ul00c00b220", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges." }, { "lang": "es", "value": "La aplicaci\u00f3n Keyguard en versiones ALE-L02C635B140 y anteriores; ALE-L02C636B140 y anteriores; ALE-L21C10B150 y anteriores; ALE-L21C185B200 y anteriores; ALE-L21C432B214 y anteriores; ALE-L21C464B150 y anteriores; ALE-L21C636B200 y anteriores; ALE-L23C605B190 y anteriores; ALE-TL00C01B250 y anteriores; ALE-UL00C00B250 y anteriores; MT7-L09C605B325 y anteriores; MT7-L09C900B339 y anteriores; MT7-TL10C900B339 y anteriores; CRR-CL00C92B172 y anteriores; CRR-L09C432B180 y anteriores; CRR-TL00C01B172 y anteriores; CRR-UL00C00B172 y anteriores; CRR-UL20C432B171 y anteriores; GRA-CL00C92B230 y anteriores; GRA-L09C432B222 y anteriores; GRA-TL00C01B230SP01 y anteriores; GRA-UL00C00B230 y anteriores; GRA-UL00C10B201 y anteriores; GRA-UL00C432B220 y anteriores; H60-L04C10B523 y anteriores; H60-L04C185B523 y anteriores; H60-L04C636B527 y anteriores; H60-L04C900B530 y anteriores; PLK-AL10C00B220 y anteriores; PLK-AL10C92B220 y anteriores; PLK-CL00C92B220 y anteriores; PLK-L01C10B140 y anteriores; PLK-L01C185B130 y anteriores; PLK-L01C432B187 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C636B130 y anteriores; PLK-TL00C01B220 y anteriores; PLK-TL01HC01B220 y anteriores; PLK-UL00C17B220 y anteriores; ATH-AL00C00B210 y anteriores; ATH-AL00C92B200 y anteriores; ATH-CL00C92B210 y anteriores; ATH-TL00C01B210 y anteriores; ATH-TL00HC01B210 y anteriores; ATH-UL00C00B210 y anteriores; RIO-AL00C00B220 y anteriores; RIO-CL00C92B220 y anteriores; RIO-TL00C01B220 y anteriores y versiones RIO-UL00C00B220 y anteriores tiene una vulnerabilidad de elevaci\u00f3n de privilegios. Un atacante podr\u00eda explotarla para ejecutar una inyecci\u00f3n de comandos para elevar privilegios." } ], "id": "CVE-2017-2692", "lastModified": "2024-11-21T03:23:59.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-22T19:29:00.333", "references": [ { "source": "psirt@huawei.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "source": "psirt@huawei.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95919" } ], "sourceIdentifier": "psirt@huawei.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2016-8768
Vulnerability from cvelistv5
Published
2017-04-02 20:00
Modified
2024-08-06 02:35
Severity ?
EPSS score ?
Summary
Huawei Honor 6, Honor 6 Plus, Honor 7 phones with software versions earlier than 6.9.16 could allow attackers to disable the PXN defense mechanism by invoking related drive code to crash the system or escalate privilege.
References
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/93885 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16 |
Version: Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:35:01.089Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en" }, { "name": "93885", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93885" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16" } ] } ], "datePublic": "2017-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Huawei Honor 6, Honor 6 Plus, Honor 7 phones with software versions earlier than 6.9.16 could allow attackers to disable the PXN defense mechanism by invoking related drive code to crash the system or escalate privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Privileged Execute-Never (PXN) defense mechanism failure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-03T09:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en" }, { "name": "93885", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93885" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2016-8768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16", "version": { "version_data": [ { "version_value": "Honor 6,Honor 6 Plus,Honor 7 Versions earlier than 6.9.16" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Huawei Honor 6, Honor 6 Plus, Honor 7 phones with software versions earlier than 6.9.16 could allow attackers to disable the PXN defense mechanism by invoking related drive code to crash the system or escalate privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privileged Execute-Never (PXN) defense mechanism failure" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161026-01-pxn-en" }, { "name": "93885", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93885" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2016-8768", "datePublished": "2017-04-02T20:00:00", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-08-06T02:35:01.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2699
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-16 21:09
Severity ?
EPSS score ?
Summary
The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/96424 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | Honor 7, Mate S,LYO-L21 |
Version: Earlier than PLK-UL00C17B385 versions, Earlier than CRR-L09C432B380 versions, Earlier than LYO-L21C577B128 versions |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96424", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96424" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Honor 7, Mate S,LYO-L21", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "Earlier than PLK-UL00C17B385 versions, Earlier than CRR-L09C432B380 versions, Earlier than LYO-L21C577B128 versions" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege Elevation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "name": "96424", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96424" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-2699", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Honor 7, Mate S,LYO-L21", "version": { "version_data": [ { "version_value": "Earlier than PLK-UL00C17B385 versions, Earlier than CRR-L09C432B380 versions, Earlier than LYO-L21C577B128 versions" } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Huawei Themes APP in versions earlier than PLK-UL00C17B385, versions earlier than CRR-L09C432B380, versions earlier than LYO-L21C577B128 has a privilege elevation vulnerability. An attacker could exploit this vulnerability to upload theme packs containing malicious files and trick users into installing the theme packets, resulting in the execution of arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege Elevation" } ] } ] }, "references": { "reference_data": [ { "name": "96424", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96424" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170222-01-theme-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-2699", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-16T21:09:01.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2693
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 03:23
Severity ?
EPSS score ?
Summary
ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/95919 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8, |
Version: ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*] |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.109Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95919", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path." } ], "problemTypes": [ { "descriptions": [ { "description": "path traversal", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-27T17:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "name": "95919", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-2693", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,", "version": { "version_data": [ { "version_value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions," } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "path traversal" } ] } ] }, "references": { "reference_data": [ { "name": "95919", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95919" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-2693", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T03:23:41.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-2692
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 04:04
Severity ?
EPSS score ?
Summary
The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/95919 | vdb-entry, x_refsource_BID | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Huawei Technologies Co., Ltd. | P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8, |
Version: ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*] |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "95919", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95919" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,", "vendor": "Huawei Technologies Co., Ltd.", "versions": [ { "status": "affected", "version": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "privilege elevation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-23T10:57:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "name": "95919", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95919" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-2692", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,", "version": { "version_data": [ { "version_value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions," } ] } } ] }, "vendor_name": "Huawei Technologies Co., Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege elevation" } ] } ] }, "references": { "reference_data": [ { "name": "95919", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95919" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2017-2692", "datePublished": "2017-11-22T19:00:00Z", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-09-17T04:04:46.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }