Vulnerabilites related to huawei - mate_7_firmware
Vulnerability from fkie_nvd
Published
2017-10-19 21:29
Modified
2024-11-21 02:31
Summary
The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input.
Impacted products
Vendor Product Version
huawei mate_7_firmware *
huawei mate_7 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E05171D-749E-49AF-AE7F-7B574578F266",
              "versionEndIncluding": "v100r001chnc00b123sp03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input."
    },
    {
      "lang": "es",
      "value": "El m\u00c3\u00b3dulo tzdrive en smartphones Huawei Mate 7 (Mate7-TL10) en versiones anteriores a la V100R001CHNC00B126SP03 permite que usuarios locales obtengan privilegios o provoquen una denegaci\u00c3\u00b3n de servicio (corrupci\u00c3\u00b3n de memoria) mediante una entrada no especificada."
    }
  ],
  "id": "CVE-2015-4421",
  "lastModified": "2024-11-21T02:31:02.027",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-10-19T21:29:00.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74742"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-10-19 21:29
Modified
2024-11-21 02:31
Summary
The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application.
Impacted products
Vendor Product Version
huawei mate_7_firmware *
huawei mate_7 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E05171D-749E-49AF-AE7F-7B574578F266",
              "versionEndIncluding": "v100r001chnc00b123sp03",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application."
    },
    {
      "lang": "es",
      "value": "El m\u00c3\u00b3dulo TEEOS en smartphones Huawei Mate 7 (Mate7-TL10) en versiones anteriores a la V100R001CHNC00B126SP03 permite que usuarios locales con permisos root obtengan privilegios o provoquen una denegaci\u00c3\u00b3n de servicio (corrupci\u00c3\u00b3n de memoria) mediante una entrada manipulada."
    }
  ],
  "id": "CVE-2015-4422",
  "lastModified": "2024-11-21T02:31:02.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-10-19T21:29:00.377",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74742"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/74742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-01-12 19:59
Modified
2024-11-21 02:37
Summary
Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application.
Impacted products
Vendor Product Version
huawei p8_firmware gra-cl10
huawei p8_firmware gra-cl100
huawei p8_firmware gra-tl00
huawei p8_firmware gra-ul10
huawei p8_firmware gra-ul100
huawei p8 -
huawei mate_7_firmware mt7-cl00
huawei mate_7_firmware mt7-tl00
huawei mate_7_firmware mt7-tl10
huawei mate_7_firmware mt7-ul00
huawei mate_7 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-cl10:*:*:*:*:*:*:*",
              "matchCriteriaId": "95A2D1FD-3FCB-484B-A995-3FC0732ECFE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-cl100:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C2F466E-299D-4DA7-93F5-8540C10AC726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2019AC75-E9C6-4AD0-B95F-2C4D03CCBBEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8D0A98-4F0D-485F-97B9-252C3A198659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-ul100:*:*:*:*:*:*:*",
              "matchCriteriaId": "631A21B4-E4D8-485A-9C80-672287B95024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-cl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "58C7458C-3423-4516-95D8-3C56AC9C9C97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-tl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F45932B-FAB6-44D1-9480-3A86B248E37C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-tl10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D60DEAA-6E4E-47D4-A09B-A41E49BE90C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-ul00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6C1DB1-9BE9-4F39-AC4D-BFFE49231CDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en memoria din\u00e1mica en el controlador HIFI en tel\u00e9fonos Huawei Mate 7 con software MT7-UL00 en versiones anteriores a MT7-UL00C17B354, MT7-TL10 en versiones anteriores a MT7-TL10C00B354, MT7-TL00 en versiones anteriores a MT7-TL00C01B354 y MT7-CL00 en versiones anteriores a MT7-CL00C92B354 y tel\u00e9fonos P8 con software GRA-TL00 en versiones anteriores a GRA-TL00C01B220SP01, GRA-CL00 en versiones anteriores a GRA-CL00C92B220, GRA-CL10 en versiones anteriores a GRA-CL10C92B220, GRA-UL00 en versiones anteriores a GRA-UL00C00B220 y GRA-UL10 en versiones anteriores a GRA-UL10C00B220 permite atacantes causar una denegaci\u00f3n de servicio (reinicio) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de una aplicaci\u00f3n manipulada."
    }
  ],
  "id": "CVE-2015-8088",
  "lastModified": "2024-11-21T02:37:59.867",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-01-12T19:59:07.097",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/77560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/77560"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-01-12 19:59
Modified
2024-11-21 02:38
Summary
The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to "input null pointer as parameter."
Impacted products
Vendor Product Version
huawei mate_7_firmware mt7-cl00
huawei mate_7_firmware mt7-tl00
huawei mate_7_firmware mt7-tl10
huawei mate_7_firmware mt7-ul00
huawei mate_7 -
huawei p8_firmware gra-cl10
huawei p8_firmware gra-cl100
huawei p8_firmware gra-tl00
huawei p8_firmware gra-ul10
huawei p8_firmware gra-ul100
huawei p8 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-cl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "58C7458C-3423-4516-95D8-3C56AC9C9C97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-tl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F45932B-FAB6-44D1-9480-3A86B248E37C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-tl10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D60DEAA-6E4E-47D4-A09B-A41E49BE90C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:mt7-ul00:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D6C1DB1-9BE9-4F39-AC4D-BFFE49231CDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-cl10:*:*:*:*:*:*:*",
              "matchCriteriaId": "95A2D1FD-3FCB-484B-A995-3FC0732ECFE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-cl100:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C2F466E-299D-4DA7-93F5-8540C10AC726",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-tl00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2019AC75-E9C6-4AD0-B95F-2C4D03CCBBEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-ul10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8D0A98-4F0D-485F-97B9-252C3A198659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:gra-ul100:*:*:*:*:*:*:*",
              "matchCriteriaId": "631A21B4-E4D8-485A-9C80-672287B95024",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to \"input null pointer as parameter.\""
    },
    {
      "lang": "es",
      "value": "El controlador HIFI en tel\u00e9fonos Huawei P8 con software GRA-TL00 en versiones anteriores a GRA-TL00C01B220SP01, GRA-CL00 en versiones anteriores a GRA-CL00C92B220, GRA-CL10 en versiones anteriores a GRA-CL10C92B220, GRA-UL00 en versiones anteriores a GRA-UL00C00B220, GRA-UL10 en versiones anteriores a GRA-UL10C00B220 y tel\u00e9fono Mate7 con software MT7-UL00 en versiones anteriores a MT7-UL00C17B354, MT7-TL10 en versiones anteriores a MT7-TL10C00B354, MT7-TL00 en versiones anteriores a MT7-TL00C01B354 y MT7-CL00 en versiones anteriores a MT7-CL00C92B354 permite a atacantes remotos causar una denegaci\u00f3n de servicio (acceso de memoria no v\u00e1lido y reinicio) a trav\u00e9s de vectores no especificados relacionados con \"entrada de puntero nulo como par\u00e1metro.\""
    }
  ],
  "evaluatorComment": "\u003ca href=\"https://cwe.mitre.org/data/definitions/476.html\"\u003eCWE-476: NULL Pointer Dereference\u003c/a\u003e",
  "id": "CVE-2015-8337",
  "lastModified": "2024-11-21T02:38:19.600",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-01-12T19:59:10.037",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-465304"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/80357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/hw-465304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/80357"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:23
Summary
ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path.
Impacted products
Vendor Product Version
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7724AF7A-50BA-4CE0-9A9A-D27566F58B25",
              "versionEndIncluding": "ale-l02c635b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EB021A-25B6-4AC2-9889-1909024FDAEA",
              "versionEndIncluding": "ale-l02c636b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "424CDED4-35A8-4C0C-8FF4-DB7BF75DDEFA",
              "versionEndIncluding": "ale-l21c10b150",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5199B31-EA26-4372-81B2-887A420D2E36",
              "versionEndIncluding": "ale-l21c185b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05436D77-3853-4F10-8E1C-7218512145A1",
              "versionEndIncluding": "ale-l21c432b214",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83678841-1D5A-4705-BC1E-D7F3154B8750",
              "versionEndIncluding": "ale-l21c464b150",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1A2384-3E3A-47B0-8CAE-ABEE549E5AAF",
              "versionEndIncluding": "ale-l21c636b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CFEE6AE-7603-4F03-AA2F-346B705115AE",
              "versionEndIncluding": "ale-l23c605b190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1207235-5EF1-4819-9A86-10E224A58E81",
              "versionEndIncluding": "ale-tl00c01b250",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6245F2E-0B7E-467D-891F-D9C7B71F2CE5",
              "versionEndIncluding": "ale-ul00c00b250.",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA0EC91-816E-40EF-A00E-567487007EB5",
              "versionEndIncluding": "mt7-l09c605b325",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B546D881-033E-401E-ABCE-B452E061ADEB",
              "versionEndIncluding": "mt7-l09c900b339",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7F2091-2CC8-4D24-85F6-0EEA3008568D",
              "versionEndIncluding": "mt7-tl10c900b339",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54076A31-2149-4AE0-88B5-FF863E374FB3",
              "versionEndIncluding": "crr-cl00c92b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1046A30D-EE1B-40B3-85E2-388B11C9F7FC",
              "versionEndIncluding": "crr-l09c432b180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0386E551-C55D-47ED-AC2B-AB2489B0A000",
              "versionEndIncluding": "crr-tl00c01b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A7DF2F-0A33-43BC-A426-0CF667905F91",
              "versionEndIncluding": "crr-ul00c00b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1AC9D1-179E-480F-93CF-7F24E3A74CB1",
              "versionEndIncluding": "crr-ul20c432b171",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2A1E69-7C2B-421F-8805-4E456576E1F7",
              "versionEndIncluding": "gra-cl00c92b230",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B044F2-678D-4FCE-A16A-0A04F0106F0B",
              "versionEndIncluding": "gra-l09c432b222",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBFE18F-4C50-4D01-8FA3-C9A24A0107CA",
              "versionEndIncluding": "gra-tl00c01b230sp01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6B0CD-AFAC-45B9-B354-C056DC191D9F",
              "versionEndIncluding": "gra-ul00c00b230",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C533D39-CB45-44A8-94BC-9FB3538EA248",
              "versionEndIncluding": "gra-ul00c10b201",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90DAA207-3B9B-4777-9713-FBF1F98A4550",
              "versionEndIncluding": "gra-ul00c432b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A916265A-0B07-4D16-87E4-EE91B0C7AA17",
              "versionEndIncluding": "h60-l04c10b523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EEC73F-65D0-4718-BFEB-63FB67587876",
              "versionEndIncluding": "h60-l04c185b523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF243FA-FD01-4C9F-B678-7A9C0B6DA8A1",
              "versionEndIncluding": "h60-l04c636b527",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7466C98-A8A9-4576-8F2F-C2E261CFC49A",
              "versionEndIncluding": "h60-l04c900b530",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1315DA87-F09A-424D-8CB1-539E37051448",
              "versionEndIncluding": "plk-al10c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6C3C2F-B6FB-40E7-BB95-90BB2285CFDE",
              "versionEndIncluding": "plk-al10c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1E6DE-CDDF-4150-9FED-CE4E493ACA22",
              "versionEndIncluding": "plk-cl00c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26",
              "versionEndIncluding": "plk-l01c10b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26",
              "versionEndIncluding": "plk-l01c10b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF4498F-D552-4CDD-AF89-69B743E7586A",
              "versionEndIncluding": "plk-l01c432b187",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF2083D-2C5A-48C9-8FE5-754D76E67E62",
              "versionEndIncluding": "plk-l01c432b190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C66FB1-5300-4641-9E43-ED4348CCDDFB",
              "versionEndIncluding": "plk-l01c636b130",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF29417-0F7D-44AC-9190-9A33C44B9116",
              "versionEndIncluding": "plk-tl00c01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1370B7E9-6661-47BF-9774-D039B4600E9F",
              "versionEndIncluding": "plk-tl01hc01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "409EE9E2-DB91-408D-AC1C-FBD2FD012D74",
              "versionEndIncluding": "plk-ul00c17b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7B4A1A-9085-499E-BC8D-8F6CB397DDC8",
              "versionEndIncluding": "ath-al00c92b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65A7370-8647-4579-967C-973C71A5BF2A",
              "versionEndIncluding": "ath-cl00c92b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8A24BA-DA72-4600-8379-325D5C301A14",
              "versionEndIncluding": "ath-tl00c01b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F981C7C9-0BDE-4BFB-B7C1-817232AB90B1",
              "versionEndIncluding": "ath-tl00hc01b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC7ACF-D9F9-4838-B2D2-B76BE6A371CB",
              "versionEndIncluding": "ath-ul00c00b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9B2A2-D817-45E8-8275-074F9D7B4FE6",
              "versionEndIncluding": "rio-al00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D73F80-CE84-4EE9-B265-F98964260847",
              "versionEndIncluding": "ath-al00c00b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3527A237-6376-4627-A751-2FB1DA21056B",
              "versionEndIncluding": "rio-al00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE61DCD9-C662-4DB6-B730-E92525F0B910",
              "versionEndIncluding": "rio-cl00c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1651C17D-C3B2-45D3-B683-5F097A8A2E76",
              "versionEndIncluding": "rio-tl00c01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "184349A3-3974-4273-9A92-30019FAFFAC2",
              "versionEndIncluding": "rio-ul00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path."
    },
    {
      "lang": "es",
      "value": "Versiones ALE-L02C635B140 y anteriores; ALE-L02C636B140 y anteriores; ALE-L21C10B150 y anteriores; ALE-L21C185B200 y anteriores; ALE-L21C432B214 y anteriores; ALE-L21C464B150 y anteriores; ALE-L21C636B200 y anteriores; ALE-L23C605B190 y anteriores; ALE-TL00C01B250 y anteriores; ALE-UL00C00B250 y anteriores; MT7-L09C605B325 y anteriores; MT7-L09C900B339 y anteriores; MT7-TL10C900B339 y anteriores; CRR-CL00C92B172 y anteriores; CRR-L09C432B180 y anteriores; CRR-TL00C01B172 y anteriores; CRR-UL00C00B172 y anteriores; CRR-UL20C432B171 y anteriores; GRA-CL00C92B230 y anteriores; GRA-L09C432B222 y anteriores; GRA-TL00C01B230SP01 y anteriores; GRA-UL00C00B230 y anteriores; GRA-UL00C10B201 y anteriores; GRA-UL00C432B220 y anteriores; H60-L04C10B523 y anteriores; H60-L04C185B523 y anteriores; H60-L04C636B527 y anteriores; H60-L04C900B530 y anteriores; PLK-AL10C00B220 y anteriores; PLK-AL10C92B220 y anteriores; PLK-CL00C92B220 y anteriores; PLK-L01C10B140 y anteriores; PLK-L01C185B130 y anteriores; PLK-L01C432B187 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C636B130 y anteriores; PLK-TL00C01B220 y anteriores; PLK-TL01HC01B220 y anteriores; PLK-UL00C17B220 y anteriores; ATH-AL00C00B210 y anteriores; ATH-AL00C92B200 y anteriores; ATH-CL00C92B210 y anteriores; ATH-TL00C01B210 y anteriores; ATH-TL00HC01B210 y anteriores; ATH-UL00C00B210 y anteriores; RIO-AL00C00B220 y anteriores; RIO-CL00C92B220 y anteriores; RIO-TL00C01B220 y anteriores y versiones RIO-UL00C00B220 tiene una vulnerabilidad de salto de ruta. Un atacante podr\u00eda explotarlo para descomprimir archivos maliciosos en una ruta de destino."
    }
  ],
  "id": "CVE-2017-2693",
  "lastModified": "2024-11-21T03:23:59.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:00.367",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
    },
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95919"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-22 19:29
Modified
2024-11-21 03:23
Summary
The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges.
Impacted products
Vendor Product Version
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei p8_lite_firmware *
huawei p8_lite -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_7_firmware *
huawei mate_7 -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei mate_s_firmware *
huawei mate_s -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei p8_firmware *
huawei p8 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_6_firmware *
huawei honor_6 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei honor_7_firmware *
huawei honor_7 -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei shotx_firmware *
huawei shotx -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -
huawei g8_firmware *
huawei g8 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7724AF7A-50BA-4CE0-9A9A-D27566F58B25",
              "versionEndIncluding": "ale-l02c635b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EB021A-25B6-4AC2-9889-1909024FDAEA",
              "versionEndIncluding": "ale-l02c636b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "424CDED4-35A8-4C0C-8FF4-DB7BF75DDEFA",
              "versionEndIncluding": "ale-l21c10b150",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5199B31-EA26-4372-81B2-887A420D2E36",
              "versionEndIncluding": "ale-l21c185b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05436D77-3853-4F10-8E1C-7218512145A1",
              "versionEndIncluding": "ale-l21c432b214",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83678841-1D5A-4705-BC1E-D7F3154B8750",
              "versionEndIncluding": "ale-l21c464b150",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1A2384-3E3A-47B0-8CAE-ABEE549E5AAF",
              "versionEndIncluding": "ale-l21c636b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CFEE6AE-7603-4F03-AA2F-346B705115AE",
              "versionEndIncluding": "ale-l23c605b190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1207235-5EF1-4819-9A86-10E224A58E81",
              "versionEndIncluding": "ale-tl00c01b250",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_lite_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6245F2E-0B7E-467D-891F-D9C7B71F2CE5",
              "versionEndIncluding": "ale-ul00c00b250.",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8_lite:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE2B9076-0E47-461F-BD6C-69FAB7572701",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA0EC91-816E-40EF-A00E-567487007EB5",
              "versionEndIncluding": "mt7-l09c605b325",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B546D881-033E-401E-ABCE-B452E061ADEB",
              "versionEndIncluding": "mt7-l09c900b339",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7F2091-2CC8-4D24-85F6-0EEA3008568D",
              "versionEndIncluding": "mt7-tl10c900b339",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96DD6375-B6FF-4530-9A56-A171BC1E7E78",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54076A31-2149-4AE0-88B5-FF863E374FB3",
              "versionEndIncluding": "crr-cl00c92b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1046A30D-EE1B-40B3-85E2-388B11C9F7FC",
              "versionEndIncluding": "crr-l09c432b180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0386E551-C55D-47ED-AC2B-AB2489B0A000",
              "versionEndIncluding": "crr-tl00c01b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A7DF2F-0A33-43BC-A426-0CF667905F91",
              "versionEndIncluding": "crr-ul00c00b172",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:mate_s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1AC9D1-179E-480F-93CF-7F24E3A74CB1",
              "versionEndIncluding": "crr-ul20c432b171",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:mate_s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B240A6C3-B8D7-4755-A74C-BE37FDE7CBF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2A1E69-7C2B-421F-8805-4E456576E1F7",
              "versionEndIncluding": "gra-cl00c92b230",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B044F2-678D-4FCE-A16A-0A04F0106F0B",
              "versionEndIncluding": "gra-l09c432b222",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFBFE18F-4C50-4D01-8FA3-C9A24A0107CA",
              "versionEndIncluding": "gra-tl00c01b230sp01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D6B0CD-AFAC-45B9-B354-C056DC191D9F",
              "versionEndIncluding": "gra-ul00c00b230",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C533D39-CB45-44A8-94BC-9FB3538EA248",
              "versionEndIncluding": "gra-ul00c10b201",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:p8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90DAA207-3B9B-4777-9713-FBF1F98A4550",
              "versionEndIncluding": "gra-ul00c432b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:p8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F43A4D21-F16A-4277-A7AF-9ADBC3429F4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A916265A-0B07-4D16-87E4-EE91B0C7AA17",
              "versionEndIncluding": "h60-l04c10b523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8EEC73F-65D0-4718-BFEB-63FB67587876",
              "versionEndIncluding": "h60-l04c185b523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF243FA-FD01-4C9F-B678-7A9C0B6DA8A1",
              "versionEndIncluding": "h60-l04c636b527",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_6_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7466C98-A8A9-4576-8F2F-C2E261CFC49A",
              "versionEndIncluding": "h60-l04c900b530",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE24C63-66F2-4647-B32D-ADA1EAC7F23E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1315DA87-F09A-424D-8CB1-539E37051448",
              "versionEndIncluding": "plk-al10c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A6C3C2F-B6FB-40E7-BB95-90BB2285CFDE",
              "versionEndIncluding": "plk-al10c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E1E6DE-CDDF-4150-9FED-CE4E493ACA22",
              "versionEndIncluding": "plk-cl00c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26",
              "versionEndIncluding": "plk-l01c10b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6D9D85B-620A-423E-965A-FA84670F5F26",
              "versionEndIncluding": "plk-l01c10b140",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF4498F-D552-4CDD-AF89-69B743E7586A",
              "versionEndIncluding": "plk-l01c432b187",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DF2083D-2C5A-48C9-8FE5-754D76E67E62",
              "versionEndIncluding": "plk-l01c432b190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50C66FB1-5300-4641-9E43-ED4348CCDDFB",
              "versionEndIncluding": "plk-l01c636b130",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF29417-0F7D-44AC-9190-9A33C44B9116",
              "versionEndIncluding": "plk-tl00c01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1370B7E9-6661-47BF-9774-D039B4600E9F",
              "versionEndIncluding": "plk-tl01hc01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:honor_7_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "409EE9E2-DB91-408D-AC1C-FBD2FD012D74",
              "versionEndIncluding": "plk-ul00c17b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:honor_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24270E44-CD62-44D4-86F9-5519AA00FA44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF7B4A1A-9085-499E-BC8D-8F6CB397DDC8",
              "versionEndIncluding": "ath-al00c92b200",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65A7370-8647-4579-967C-973C71A5BF2A",
              "versionEndIncluding": "ath-cl00c92b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8A24BA-DA72-4600-8379-325D5C301A14",
              "versionEndIncluding": "ath-tl00c01b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F981C7C9-0BDE-4BFB-B7C1-817232AB90B1",
              "versionEndIncluding": "ath-tl00hc01b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DC7ACF-D9F9-4838-B2D2-B76BE6A371CB",
              "versionEndIncluding": "ath-ul00c00b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9B2A2-D817-45E8-8275-074F9D7B4FE6",
              "versionEndIncluding": "rio-al00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:shotx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D73F80-CE84-4EE9-B265-F98964260847",
              "versionEndIncluding": "ath-al00c00b210",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:shotx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FFA51A-9148-4BFD-8A69-F2629F3769BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3527A237-6376-4627-A751-2FB1DA21056B",
              "versionEndIncluding": "rio-al00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE61DCD9-C662-4DB6-B730-E92525F0B910",
              "versionEndIncluding": "rio-cl00c92b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1651C17D-C3B2-45D3-B683-5F097A8A2E76",
              "versionEndIncluding": "rio-tl00c01b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:huawei:g8_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "184349A3-3974-4273-9A92-30019FAFFAC2",
              "versionEndIncluding": "rio-ul00c00b220",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:huawei:g8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECB64C25-4F52-423D-A163-B1C248754B1D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges."
    },
    {
      "lang": "es",
      "value": "La aplicaci\u00f3n Keyguard en versiones ALE-L02C635B140 y anteriores; ALE-L02C636B140 y anteriores; ALE-L21C10B150 y anteriores; ALE-L21C185B200 y anteriores; ALE-L21C432B214 y anteriores; ALE-L21C464B150 y anteriores; ALE-L21C636B200 y anteriores; ALE-L23C605B190 y anteriores; ALE-TL00C01B250 y anteriores; ALE-UL00C00B250 y anteriores; MT7-L09C605B325 y anteriores; MT7-L09C900B339 y anteriores; MT7-TL10C900B339 y anteriores; CRR-CL00C92B172 y anteriores; CRR-L09C432B180 y anteriores; CRR-TL00C01B172 y anteriores; CRR-UL00C00B172 y anteriores; CRR-UL20C432B171 y anteriores; GRA-CL00C92B230 y anteriores; GRA-L09C432B222 y anteriores; GRA-TL00C01B230SP01 y anteriores; GRA-UL00C00B230 y anteriores; GRA-UL00C10B201 y anteriores; GRA-UL00C432B220 y anteriores; H60-L04C10B523 y anteriores; H60-L04C185B523 y anteriores; H60-L04C636B527 y anteriores; H60-L04C900B530 y anteriores; PLK-AL10C00B220 y anteriores; PLK-AL10C92B220 y anteriores; PLK-CL00C92B220 y anteriores; PLK-L01C10B140 y anteriores; PLK-L01C185B130 y anteriores; PLK-L01C432B187 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C432B190 y anteriores; PLK-L01C636B130 y anteriores; PLK-TL00C01B220 y anteriores; PLK-TL01HC01B220 y anteriores; PLK-UL00C17B220 y anteriores; ATH-AL00C00B210 y anteriores; ATH-AL00C92B200 y anteriores; ATH-CL00C92B210 y anteriores; ATH-TL00C01B210 y anteriores; ATH-TL00HC01B210 y anteriores; ATH-UL00C00B210 y anteriores; RIO-AL00C00B220 y anteriores; RIO-CL00C92B220 y anteriores; RIO-TL00C01B220 y anteriores y versiones RIO-UL00C00B220 y anteriores tiene una vulnerabilidad de elevaci\u00f3n de privilegios. Un atacante podr\u00eda explotarla para ejecutar una inyecci\u00f3n de comandos para elevar privilegios."
    }
  ],
  "id": "CVE-2017-2692",
  "lastModified": "2024-11-21T03:23:59.420",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-22T19:29:00.333",
  "references": [
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
    },
    {
      "source": "psirt@huawei.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95919"
    }
  ],
  "sourceIdentifier": "psirt@huawei.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2015-8088
Vulnerability from cvelistv5
Published
2016-01-12 19:00
Modified
2024-08-06 08:13
Severity ?
Summary
Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:13:30.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "77560",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/77560"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-11-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "77560",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/77560"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the HIFI driver in Huawei Mate 7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 and P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, and GRA-UL10 before GRA-UL10C00B220 allows attackers to cause a denial of service (reboot) or execute arbitrary code via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "77560",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/77560"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/hw-460347",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/hw-460347"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8088",
    "datePublished": "2016-01-12T19:00:00",
    "dateReserved": "2015-11-06T00:00:00",
    "dateUpdated": "2024-08-06T08:13:30.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-4421
Vulnerability from cvelistv5
Published
2017-10-19 21:00
Modified
2024-08-06 06:11
Severity ?
Summary
The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:11:12.949Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "74742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74742"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-23T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "74742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74742"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-4421",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The tzdriver module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users to gain privileges or cause a denial of service (memory corruption) via an unspecified input."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "74742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74742"
            },
            {
              "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm",
              "refsource": "CONFIRM",
              "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-4421",
    "datePublished": "2017-10-19T21:00:00",
    "dateReserved": "2015-06-08T00:00:00",
    "dateUpdated": "2024-08-06T06:11:12.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2693
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 03:23
Severity ?
Summary
ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8, Version: ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:02:07.109Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95919",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95919"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "path traversal",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-27T17:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "name": "95919",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95919"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-2693",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a path traversal vulnerability. An attacker may exploit it to decompress malicious files into a target path."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "path traversal"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95919",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95919"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-2693",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-09-17T03:23:41.979Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2692
Vulnerability from cvelistv5
Published
2017-11-22 19:00
Modified
2024-09-17 04:04
Severity ?
Summary
The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges.
Impacted products
Vendor Product Version
Huawei Technologies Co., Ltd. P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8, Version: ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:02:07.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95919",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95919"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,",
          "vendor": "Huawei Technologies Co., Ltd.",
          "versions": [
            {
              "status": "affected",
              "version": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60- ...[truncated*]"
            }
          ]
        }
      ],
      "datePublic": "2017-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "privilege elevation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-23T10:57:01",
        "orgId": "25ac1063-e409-4190-8079-24548c77ea2e",
        "shortName": "huawei"
      },
      "references": [
        {
          "name": "95919",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95919"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@huawei.com",
          "DATE_PUBLIC": "2017-11-15T00:00:00",
          "ID": "CVE-2017-2692",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "P8 Lite,Mate 7,Mate S,P8,honor 6,honor 7,SHOTX,G8,",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions,"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Huawei Technologies Co., Ltd."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Keyguard application in ALE-L02C635B140 and earlier versions,ALE-L02C636B140 and earlier versions,ALE-L21C10B150 and earlier versions,ALE-L21C185B200 and earlier versions,ALE-L21C432B214 and earlier versions,ALE-L21C464B150 and earlier versions,ALE-L21C636B200 and earlier versions,ALE-L23C605B190 and earlier versions,ALE-TL00C01B250 and earlier versions,ALE-UL00C00B250 and earlier versions,MT7-L09C605B325 and earlier versions,MT7-L09C900B339 and earlier versions,MT7-TL10C900B339 and earlier versions,CRR-CL00C92B172 and earlier versions,CRR-L09C432B180 and earlier versions,CRR-TL00C01B172 and earlier versions,CRR-UL00C00B172 and earlier versions,CRR-UL20C432B171 and earlier versions,GRA-CL00C92B230 and earlier versions,GRA-L09C432B222 and earlier versions,GRA-TL00C01B230SP01 and earlier versions,GRA-UL00C00B230 and earlier versions,GRA-UL00C10B201 and earlier versions,GRA-UL00C432B220 and earlier versions,H60-L04C10B523 and earlier versions,H60-L04C185B523 and earlier versions,H60-L04C636B527 and earlier versions,H60-L04C900B530 and earlier versions,PLK-AL10C00B220 and earlier versions,PLK-AL10C92B220 and earlier versions,PLK-CL00C92B220 and earlier versions,PLK-L01C10B140 and earlier versions,PLK-L01C185B130 and earlier versions,PLK-L01C432B187 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C432B190 and earlier versions,PLK-L01C636B130 and earlier versions,PLK-TL00C01B220 and earlier versions,PLK-TL01HC01B220 and earlier versions,PLK-UL00C17B220 and earlier versions,ATH-AL00C00B210 and earlier versions,ATH-AL00C92B200 and earlier versions,ATH-CL00C92B210 and earlier versions,ATH-TL00C01B210 and earlier versions,ATH-TL00HC01B210 and earlier versions,ATH-UL00C00B210 and earlier versions,RIO-AL00C00B220 and earlier versions,RIO-CL00C92B220 and earlier versions,RIO-TL00C01B220 and earlier versions,RIO-UL00C00B220 and earlier versions have a privilege elevation vulnerability. An attacker may exploit it to launch command injection in order to gain elevated privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "privilege elevation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95919",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95919"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170125-01-emui-en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e",
    "assignerShortName": "huawei",
    "cveId": "CVE-2017-2692",
    "datePublished": "2017-11-22T19:00:00Z",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-09-17T04:04:46.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-4422
Vulnerability from cvelistv5
Published
2017-10-19 21:00
Modified
2024-08-06 06:11
Severity ?
Summary
The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T06:11:12.890Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "74742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/74742"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-05-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-23T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "74742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/74742"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-4422",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The TEEOS module in Huawei Mate 7 (Mate7-TL10) smartphones before V100R001CHNC00B126SP03 allows local users with root permissions to gain privileges or cause a denial of service (memory corruption) via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "74742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/74742"
            },
            {
              "name": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm",
              "refsource": "CONFIRM",
              "url": "http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-432799.htm"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-4422",
    "datePublished": "2017-10-19T21:00:00",
    "dateReserved": "2015-06-08T00:00:00",
    "dateUpdated": "2024-08-06T06:11:12.890Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2015-8337
Vulnerability from cvelistv5
Published
2016-01-12 19:00
Modified
2024-08-06 08:13
Severity ?
Summary
The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to "input null pointer as parameter."
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:13:32.461Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "80357",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/80357"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.huawei.com/en/psirt/security-advisories/hw-465304"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to \"input null pointer as parameter.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "80357",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/80357"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.huawei.com/en/psirt/security-advisories/hw-465304"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2015-8337",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The HIFI driver in Huawei P8 phones with software GRA-TL00 before GRA-TL00C01B220SP01, GRA-CL00 before GRA-CL00C92B220, GRA-CL10 before GRA-CL10C92B220, GRA-UL00 before GRA-UL00C00B220, GRA-UL10 before GRA-UL10C00B220 and Mate7 phones with software MT7-UL00 before MT7-UL00C17B354, MT7-TL10 before MT7-TL10C00B354, MT7-TL00 before MT7-TL00C01B354, and MT7-CL00 before MT7-CL00C92B354 allows remote attackers to cause a denial of service (invalid memory access and reboot) via unspecified vectors related to \"input null pointer as parameter.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "80357",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/80357"
            },
            {
              "name": "http://www.huawei.com/en/psirt/security-advisories/hw-465304",
              "refsource": "CONFIRM",
              "url": "http://www.huawei.com/en/psirt/security-advisories/hw-465304"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2015-8337",
    "datePublished": "2016-01-12T19:00:00",
    "dateReserved": "2015-11-24T00:00:00",
    "dateUpdated": "2024-08-06T08:13:32.461Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}